News

News Archive

  • May 21, 2007 21 May'07

    Cisco warns of new IOS flaws

    The new flaws are classified as "low," but if exploited they could result in a sustained DoS condition, Cisco said.

  • May 21, 2007 21 May'07

    EMC users push for better power consumption

    EMC announces a 1.8 PB VTL, deduplication for VMware and bare-metal restore for servers as users caution the company to stay focused on everyday problems, such as power consumption.

  • May 21, 2007 21 May'07

    Mobile instant messaging enhances company's business processes

    A mobile IM service acquired by a hosted VoIP provider encourages more companies to enhance their business processes.

  • May 21, 2007 21 May'07

    Microsoft, TCG partner on network access control; Cisco takes own route

    Microsoft and the Trusted Computing Group (TCG) have joined forces to create better interoperability between network access control solutions with the announcement of a new specification which ensures that Microsoft's Network Access Protection (NAP)...

  • May 20, 2007 20 May'07

    Learn NetStar's secret to success

    NetStar is a systems integrator and managed service provider and also a survivor of the dot.com crash. The company secured venture capital funding way back at the turn of the century and has put the money to good use, eschewing the ebony ...

  • May 17, 2007 17 May'07

    VoIP security fundamentals

    VoIP security is a challenge for IT staff because IP telephony brings with it not only the security problems of data networks but also new threats specific to VoIP. In this fundamentals guide, learn about network security threats and emerging IP ...

  • May 16, 2007 16 May'07

    Screencast: How to configure a UTM device

    In this exclusive screencast, expert David Strom demonstrates the configuration options available in SonicWall's unified threat management product.

  • May 16, 2007 16 May'07

    When signature based antivirus isn't enough

    Zero-day exploits, targeted attacks and increasing demands for endpoint application controls are driving the rapid metamorphosis from signature-based antivirus and antispyware to HIPS-based integrated products.

  • May 11, 2007 11 May'07

    Choosing WAN providers: Key questions to ask

    When evaluating carrier services for the WAN, it's imperative to ask some key questions regarding customer service, service-level agreements, global coverage, management and monitoring capabilities, and underlying technologies. Make sure these ...

  • May 11, 2007 11 May'07

    Cisco fixes fresh flaws in IOS

    Attackers could exploit two flaws in Cisco's IOS to cause a denial of service or tamper with data in a device file system.

  • May 11, 2007 11 May'07

    VoIP, unified communications adoption continue to rise

    VoIP and unified communications adoption continue to rise steadily in the enterprise, according to Infonetics Research's latest report.

  • May 10, 2007 10 May'07

    EMC buys Indigo Stone for bare-metal restore

    EMC has been hush-hush about adding Indigo Stone, a bare-metal restore software company, to its stack of acquisitions.

  • May 09, 2007 09 May'07

    Symantec fixes flaws in Norton, pcAnywhere

    Attackers could exploit flaws in Symantec's Norton AntiVirus and pcAnywhere to launch malicious code or compromise a user's session credentials.

  • May 08, 2007 08 May'07

    Companies plug FTP holes with secure FTP servers

    Some companies are investing in secure FTP suites to give employees and business partners the ability to transfer large files such as large documents, audio, video and photos.