News

Network hardware

  • September 05, 2006 05 Sep'06

    ControlGuard targets rogue devices

    ControlGuard Access Manager is an effective tool for controlling what devices users can add to their workstations and how they are used.

  • September 05, 2006 05 Sep'06

    VoIP outsourcing: Save money and gain flexibility

    VoIP outsourcing is the way to go for organisations looking to deploy voice services quickly and flexibly without a major investment in skills and upkeep.

  • September 04, 2006 04 Sep'06

    Revamped Cisco WAFS worth the wait, users say

    Months late, Cisco has finally released a combined Wan optimisation and WAFS product, while startups like Riverbed have been snapping up the customers. But some Cisco beta testers say it has been worth the wait.

  • August 30, 2006 30 Aug'06

    VoIP outsourcing: Save money while gaining flexibility

    VoIP outsourcing is the way to go for firms looking to deploy voice services quickly and flexibly without a major investment in skills and upkeep.

  • August 29, 2006 29 Aug'06

    AT&T breach affects 19,000 customers

    Online outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit monitoring services for those affected.

  • August 28, 2006 28 Aug'06

    Riverbed update offers users more bandwidth, better reporting

    Riverbed announced a package of hardware and software updates, which some customers say they've been waiting for.

  • August 27, 2006 27 Aug'06

    3PAR adds midrange array for secondary sites

    3PAR has introduced a smaller version of its InServ Storage Server, which it describes as a product-line extension into its existing customer base.

  • August 21, 2006 21 Aug'06

    Briefs: VoiceCon in the news

    This week at VoiceCon we saw everything from managed VoIP services to IP phones made to make mobile workers right at home, wherever they are.

  • August 15, 2006 15 Aug'06

    Cisco says it can't reproduce PIX flaw

    Ever since a researcher at Black Hat outlined a flaw in the PIX firewall, Cisco has been trying to reproduce the security hole. So far, the company has been unsuccessful.

  • August 15, 2006 15 Aug'06

    Cisco boosts VoIP certification

    The upgraded CCNP midlevel Cisco certification now incorporates VoIP, security and wireless to boost converged network skills among enterprise professionals.

  • August 03, 2006 03 Aug'06

    Vendors reject preferential knowledge sharing

    While Cisco continues to investigate a potential PIX firewall flaw, it and other vendors say sharing security information quickly and indiscriminately is always the best policy.

  • August 02, 2006 02 Aug'06

    Possible Cisco zero-day exploit revealed at Black Hat

    Details of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as Cisco and US-CERT investigate.

  • July 26, 2006 26 Jul'06

    Blue Cross bears burden of 'no wireless' policy

    Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something.

  • November 28, 2005 28 Nov'05

    Step 6: Configuring wireless clients

    With wireless networks proliferating it is a good idea to understand what it takes to build a VPN for a wireless gateway. Contributor and Microsoft MVP Brien Posey details the necessary steps in this step-by-step guide.

  • November 21, 2005 21 Nov'05

    Wireless security: Public Wi-Fi could open security holes

    A Michigan county is working to give everyone within its borders wireless Internet access. But when it comes to security, users are on their own.

  • November 20, 2005 20 Nov'05

    Wireless security crucial to railway safety

    A transportation firm uses wireless technology to keep the trains running on time. But securing mobile devices isn't easy when they're spread across the globe.

  • November 16, 2005 16 Nov'05

    Wireless security: Companies deal with software updates

    A health care provider found it could use wireless technology to dramatically boost patient care. But first it had to figure out how to deploy security updates over a wireless network.

  • October 12, 2005 12 Oct'05

    Quiz: What's your infosec IQ?

    We've collected our toughest questions to see how well you stand up to a challenge. Put your knowledge to the test and let us know how you do.

  • September 26, 2005 26 Sep'05

    NHS trust creates wireless record

    University College London Hospitals (UCLH) NHS Trust has created the UK's largest single wireless network to support 7,000 users across eight hospitals.

  • September 20, 2005 20 Sep'05

    SAS drives product roundup

    Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market.

  • September 11, 2005 11 Sep'05

    VoIP turns up the heat on firewalls

    New research shows that many organizations are increasingly concerned about VoIP security and plan to augment their firewalls within the next year, changing the landscape of the firewall market.

  • September 05, 2005 05 Sep'05

    Extending perimeters

    The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels.

  • August 29, 2005 29 Aug'05

    Storage area network quiz

    It's all about the storage area network (SAN) -- man. The more you know, the easier it is. Take our SAN quiz and find out where you stand as a SAN guru.

  • July 26, 2005 26 Jul'05

    VoIP encryption to have 'Pretty Good Privacy

  • July 12, 2005 12 Jul'05

    Tony Asaro: Blogs and more

    Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts.

  • June 13, 2005 13 Jun'05

    Gartner underscores five overblown threats

    Two Gartner analysts debunk five overhyped security risks they claim are causing companies to miss out on some key emerging technologies.

  • May 11, 2005 11 May'05

    A new era of computer worms: Wireless mobile worms

    In this excerpt of Chapter 9 from "The Art of Computer Virus Research and Defense," author Peter Szor dissects the Cabir worm.

  • March 08, 2005 08 Mar'05

    Small businesses targeted with RFID

  • August 27, 2004 27 Aug'04

    Over-specify when buying low cost replacement for Frame Relay

    A project manager reveals how a VPN saved £275,000 a year

  • July 07, 2004 07 Jul'04

    Deals abound for high-end storage

    Think high-end storage is out of your reach? Maybe not. Conversations with several storage buyers recently suggest that vendors are scrambling to give buyers the best possible deals.

  • May 23, 2004 23 May'04

    Hacking for Dummies: Chapter 10 -- Wireless LANs

    Read Chapter 10, Wireless LANs, from the book "Hacking for Dummies" written by Kevin Beaver.

  • April 27, 2004 27 Apr'04

    Backup school: Quiz two, answer six

    Here is the answer to Backup school quiz two, question six.

  • January 15, 2004 15 Jan'04

    Resource guide to disk-based backup

  • September 20, 2001 20 Sep'01

    Rambus speeds to take on P4

    The company showed its next-generation signalling technology, code-named Yellowstone, at the Rambus Developer Forum in California...