Business applications
At the heart of enterprise software strategy are the key business applications upon which every organisation relies. From enterprise resource planning (ERP) to customer relationship management (CRM), financial and accounts software to business intelligence (BI), such applications demand high investments and can deliver high returns. We analyse the latest product developments and the news from major suppliers such as Oracle, Microsoft and SAP.
-
News
16 May 2025
Kissflow finds its place in low-code market
The supplier of low-code software development tools that cater to both citizen developers and IT professionals is experiencing rapid growth in Southeast Asia where it has been doubling its revenue over the past four years Continue Reading
By- Aaron Tan, TechTarget
-
Feature
15 May 2025
Is IPSIE the game changer that SaaS security demands?
It started with an announcement in October 2024, and now it seems the vision of secure identity in the enterprise is becoming a reality. We look at the prospects for IPSIE Continue Reading
By
-
News
22 Aug 2007
Microsoft adds CA vets to anti-malware team
Microsoft has hired Jakub Kaminski, one of CA's more talented and well-regarded antivirus researchers, and three of his colleagues from CA's Australian lab. Continue Reading
-
News
22 Aug 2007
Attackers target two Microsoft security flaws
Symantec warned customers about attacks targeting two Microsoft security flaws -- an unpatched DirectX Media vulnerability and the XML Core Services flaw patched in MS07-042. Continue Reading
By -
Feature
21 Aug 2007
Backup reporting expands to add capacity planning
Aptare adds capacity planning for primary data storage to its product line, joining Symantec in recent attempts to broaden the appeal of reporting software. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
20 Aug 2007
Sourcefire acquires open source ClamAV
Sourcefire, maker of the popular Snort open source IDS tool, has acquired ClamAV, an open source email gateway scanning tool. Continue Reading
By -
News
20 Aug 2007
VMware acquires HIPS provider Determina
VMware, the leader in virtualization software, has acquired Determina, a provider of host IPS technology. Continue Reading
-
News
19 Aug 2007
College campuses prepare for Microsoft Vista challenges
With new Vista machines coming to campus, the IT shops of academia have no choice but to embrace the latest Windows OS and its security implications. Continue Reading
By -
News
17 Aug 2007
Wal-Mart deploys new data security system
Wal-Mart Stores has deployed a data security and encryption system to secure data going over its global network. Continue Reading
-
News
17 Aug 2007
HDS, HP simplify high-end disk array pricing
Users of the new USP-V disk array from HDS and the XP24000 disk array from HP will now pay less for attaching external storage, as well as capacity. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
16 Aug 2007
TJX profit takes hit over data breach
TJX says it has spent $256 million responding to the massive data breach that exposed 45 million customers to identity fraud, and the bottom line has suffered as a result. Continue Reading
By- SearchSecurity.com Staff
-
Feature
16 Aug 2007
Firewall deployment options increase for enterprises
With a growing number firewall configuration options, companies need to spend more time and put more effort into determining how to design and deploy firewalls. Continue Reading
-
News
15 Aug 2007
Latest Microsoft flaws affect Windows, IE, Excel
Microsoft released nine security updates Tuesday -- six of them critical -- for flaws in Internet Explorer, Excel and other programs within the Windows OS. Continue Reading
By -
News
14 Aug 2007
Novell to acquire Senforce for endpoint security
Novell is acquiring Senforce, an early network access control supplier, to integrate its endpoint security features and develop an endpoint management suite. Continue Reading
By- Robert Westervelt, TechTarget
-
News
14 Aug 2007
Apple iPhone to provoke complex mobile attacks, expert warns
Mikko Hypponen, director of antivirus research at F-Secure, said he expects mobile malware attacks to escalate thanks to interest in Apple's iPhone. Continue Reading
By -
Feature
12 Aug 2007
VoIP models and services: Complete guide
With clear, concise explanations of existing VoIP business models and deployment methodologies, this guide will enable you to weigh the pros and cons of each based on your needs. Continue Reading
-
News
10 Aug 2007
SMEs’ CRM needs catered for in Sage 200
Accounting software specialist Sage has expanded its business automation software portfolio with the launch of a customer relationship management system, Sage 200. Continue Reading
-
News
09 Aug 2007
Buying Guide for NAS management software
Learn the key evaluation factors for purchasing NAS management software in this Buying Guide. Continue Reading
-
News
09 Aug 2007
NAS appliance purchase considerations
NAS appliances are frequently touted for bringing convenience and simplicity to network storage. Appliances include their own dedicated disks for storage and RAID, and most NAS appliances can be upgraded with more or larger disks for additional storage space. However, NAS appliances do pose some disadvantages. Consequently, the choice of NAS appliance requires careful evaluation. Now that you've reviewed the essential issues involved in any NAS product, this guide focuses on specific considerations for dedicated NAS appliances. You'll also find a series of specifications to help make on-the-spot product comparisons between vendors. Continue Reading
-
News
09 Aug 2007
Sun adds virtual tape library to Thumper
Analysts say the combo of FalconStor's software, Solaris and Thumper is a good sign of integration from Sun after a disorganised year, but it's unclear if users will be convinced. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
09 Aug 2007
VoIP vulnerability threatens data
VoIP vulnerabilities have now reached a level of sophistication that allows hackers to steal, view or delete data. Continue Reading
By- Andrew R. Hickey, News Editor
-
News
09 Aug 2007
Immunity releases new exploit-writing tool
Pen testing company says its Debugger tool offers researchers a new way to write exploits, analyse malware and reverse engineer binary files. Continue Reading
By -
News
08 Aug 2007
NAS appliance specifications
NAS appliances are noted for their convenience, offering dedicated internal storage that is relatively straightforward to identify and manage. The biggest issue for NAS appliances is avoiding network bottlenecks and supporting expansion without having to proliferate additional appliances across the network. The product snapshots in this chapter highlight key specifications for a cross section of major NAS appliance products. Continue Reading
-
News
08 Aug 2007
Cisco warns of critical IOS flaws
Attackers could exploit multiple flaws in Cisco's IOS to cause a denial of service or remotely execute arbitrary code. Continue Reading
By- SearchSecurity.com Staff
-
News
08 Aug 2007
Wi-Fi simplicity edging out Wi-Fi security
Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach. Continue Reading
By- Eric Parizo, Senior Analyst
-
News
07 Aug 2007
Application-aware storage promises intelligence and automation
Storage professionals overbuy both performance and capacity in an effort to forestall potential storage problems. Tiered storage was one way to address this problem -- matching storage resources and costs with the value of data. Today, storage is poised to build on this notion with application-aware storage, using business policies to bring autonomy and intelligence to enterprise storage. Still, there is a great deal of confusion surrounding this technology, its capabilities and its deployment. Continue Reading
-
Feature
07 Aug 2007
How to cheat at VoIP Security
Securing a VoIP infrastructure requires planning, analysis, and detailed knowledge about the specifics of the implementation you choose to use. Continue Reading
-
News
07 Aug 2007
Subpar security compromises compliance
Pressure to keep trading applications available has nudged security to the back of the development line. Continue Reading
-
Feature
06 Aug 2007
Does compliance make encryption always necessary?
Many organisations look to encryption to protect sensitive data. Yet hundreds of millions of people who use the Internet also use encryption, yet most of them don't even know it. Continue Reading
-
News
06 Aug 2007
Researchers wrangle petabytes of data storage with NAS, tape
Scientists at Cern's LHC say dozens of petabytes require custom-built NAS systems and data migration software, but commercial tape drives are mostly up to snuff. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
03 Aug 2007
Discovery of malware cesspool triggers attack fears
Trend Micro researchers say a malware-infested Web server in Russia, linked to several Italian Web sites, could lead to a large-scale attack. Continue Reading
By- SearchSecurity.com Staff
-
News
02 Aug 2007
Apple releases fixes for Mac OS X, iPhone vulnerabilities
Apple Computer has released software patches fixing critical vulnerabilities in Mac OS X and its newly released iPhone. Continue Reading
By- Edmund X. DeJesus, Contributor
-
News
01 Aug 2007
Users make iSCSI Sans with USB keys
Users say that Open-E's iSCSI San software, which is delivered on a USB stick, is more affordable than prepackaged systems and has more support than free iSCSI target products. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
01 Aug 2007
Mozilla fixes two critical Firefox flaws
Firefox version 2.0.0.6 addresses critical flaws involving unescaped URLs passing to external programs and privilege escalation. Continue Reading
By- SearchSecurity.com Staff
-
News
31 Jul 2007
Riverbed extends WAFS to laptops
Steelhead Mobile installs on workstations without an onsite appliance. Users say they'd like to see better integration between the mobile and data center versions of the product. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
30 Jul 2007
Warning issued over unpatched Firefox flaw
Vulnerability clearinghouse Secunia and US-CERT have issued advisories about the input validation flaw Continue Reading
By- Robert Westervelt, TechTarget
-
News
30 Jul 2007
Most antispam technologies get failing grade
An independent study finds that many enterprises are not satisfied with traditional antispam technologies. Continue Reading
By- Robert Westervelt, TechTarget
-
News
25 Jul 2007
EMC reports Clariion surge, data archiving slump
EMC's revenues are up this quarter, attributed in part to a big boost in Clariion sales, but CEO Joe Tucci is critical of the company's execution in data archiving. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
25 Jul 2007
Serious flaw affects BIND Internet server software
BIND DNS software, used in translating domain names into IP addresses for Internet traffic, has a flaw that could trick users into visiting a malicious Web site. Continue Reading
-
News
25 Jul 2007
Cisco issues warning for wireless LAN controller flaws
Cisco Systems is warning customers of flaws in its wireless LAN controllers that initially crippled a wireless network at Duke University. Continue Reading
By- Robert Westervelt, TechTarget
-
News
24 Jul 2007
Hifn buys Siafu for storage security, data reduction
Chipmaker Hifn is looking to get into storage systems. It says OEMs are already lined up for encrypted iSCSI SAN and primary storage data reduction products. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
24 Jul 2007
XenSource embeds Symantec storage software
Server virtualisation firm XenSource embeds Symantec's storage management software into its hypervisor Continue Reading
By- Jo Maitland, TechTarget
-
News
24 Jul 2007
Apple iPhone crack discovered by security researchers
Researchers have found a way to take complete control of the Apple iPhone by sending a user to a malicious Web site. Continue Reading
-
News
24 Jul 2007
New hacking technique exploits common programming error
Researchers at Watchfire Inc. say they discovered a new technique that exploits a common dangling pointer error. Continue Reading
-
News
23 Jul 2007
PCI compliance costs often underestimated, study finds
Companies are moving forward with PCI DSS projects, but many are underestimating the costs associated with compliance. Continue Reading
By- Robert Westervelt, TechTarget
-
News
23 Jul 2007
LeftHand refreshes iSCSI SAN software
Version 7.0 of LeftHand's iSCSI SAN software contains dozens of new features, including support for four-way replication and brushed-up thin provisioning. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
23 Jul 2007
Core Security CEO to step down
Paul Paget, the CEO of penetration testing software vendor Core Security Technologies said he is better-suited for start-ups Continue Reading
-
News
22 Jul 2007
Black Hat Las Vegas 2007: Special news coverage
SearchSecurity.com covers all the controversy at this year's show with news, features, podcasts, interviews, exploits and more direct from Las Vegas. Continue Reading
-
News
18 Jul 2007
For Boeing, data security, network access still hazy
Boeing is trying to reshape its network security architecture to better protect sensitive systems from threats without degrading employee productivity. Continue Reading
By- Robert Westervelt, TechTarget
-
News
17 Jul 2007
CDP platform purchase considerations
Busy IT organizations are employing continuous data protection (CDP) technologies to guard data on the fly, essentially eliminating the backup window and allowing granular file and system restoration -- sometimes down to the individual disk write operation. Several CDP appliances are available, but many are implemented in software, and all require careful consideration before purchase. This article focuses on the specific purchase considerations for CDP products. Continue Reading
-
News
17 Jul 2007
Oracle plans 46 security updates for database, software
Attackers could tamper with database servers and host operating systems by exploiting flaws across Oracle's product line. Continue Reading
By -
News
16 Jul 2007
Oracle's July 2007 CPU has 45 security fixes
Oracle stuffed 45 security updates into its July 2007 CPU, fixing flaws across its product line attackers could exploit remotely to compromise corporate databases. Continue Reading
By -
News
13 Jul 2007
Antispyware legislation gets tepid reviews
Congress is debating three different bills that would punish spyware pushers, but some IT professionals have their doubts about legislation as a solution to the problem. Continue Reading
By -
News
12 Jul 2007
IBM washes hands of IceCube storage project
IBM is spinning out its long overdue next-generation storage system, code-named IceCube, and is seeking $15 million in funding to commercialize the product. Continue Reading
By- Jo Maitland, TechTarget
-
News
12 Jul 2007
Zero-day auction site highlights ethical debate
A new auction site plans to cash in on flaw research. Executive Editor Dennis Fisher explores if it's a viable business model and if research should be sold to the highest bidder. Continue Reading
-
News
11 Jul 2007
Mobility could hold the key to broader UC adoption
Unified communications (UC) and unified messaging are on the verge of launching a mobile platform. Learn more about mobile UC from Yankee Group's Zeus Kerravala. Continue Reading
By- Zeus Kerravala, ZK Research
-
News
09 Jul 2007
Microsoft July updates for critical Excel, Windows and .NET flaws
Of the six security updates Microsoft released Tuesday, experts expressed the most concern about a critical glitch in the .NET Framework that could leave client machines and Web servers open to attack. Continue Reading
By -
News
09 Jul 2007
Google buy shakes up email archiving
Google's acquisition of Postini will boost adoption of Gmail, pushing email archiving players to add support for hosted applications. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
06 Jul 2007
Microsoft preps six security updates for Windows, Office
Microsoft will release six security updates on Tuesday 10 July to address flaws attackers could exploit to launch malicious code and access sensitive information on victims' machines. Continue Reading
By- SearchSecurity.com Staff
-
News
05 Jul 2007
Zero-day auction site opened by Swiss lab
Swiss start-up WabiSabiLabi is offering zero-day findings for qualified buyers. The site could fuel new debate over flaw disclosure. Continue Reading
By -
News
04 Jul 2007
Cisco users upbeat about security direction
Cisco customers say the vendor's security strategy is headed in the right direction, which is why they believe the networking giant's IronPort integration will be smooth sailing. Continue Reading
By -
Feature
03 Jul 2007
Data migration product specifications
Part of the Tiered Storage Buying guide focusing on product specifications for data migration tools. Continue Reading
-
News
03 Jul 2007
Data storage startups emerge from stealth
Three new storage firms have come out of stealth mode this June. Analysts predict the next new crop of startups will focus on wireless storage, reporting and alternatives to RAID. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
02 Jul 2007
Are PCI auditors pitching products?
Auditors shouldn't be pitching remediation services or products to bring a company into compliance with PCI DSS rules, but some merchants are reporting the practice Continue Reading
By- Robert Westervelt, TechTarget
- News 01 Jul 2007
-
Feature
29 Jun 2007
State agency tiers records storage with Compellent
The South Carolina attorney general's office estimates it will save thousands by storing millions of paper records in digital format using Compellent's automated tiered storage. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
27 Jun 2007
Cisco vows to maintain IronPort tech, talent
As it completes the purchase of IronPort Systems, Cisco vows to maintain IronPort's talent base and make investments to keep its newly-acquired technology fresh. Continue Reading
By -
News
25 Jun 2007
Richard Granger's departure may jeopardise NHS IT programme
Richard Granger's departure from Connecting for Health may jeopardise the stability and success of the politically driven NHS National Programme for IT. Continue Reading
By -
News
25 Jun 2007
PCI Council hears complaints, suggestions for changes
Companies with the most stringent security technologies endure hurdles to comply with PCI DSS. Some firms are turning to the upcoming Burton Group Catalyst Conference for answers. Continue Reading
By- Robert Westervelt, TechTarget
-
News
25 Jun 2007
Instant messaging usage increase highlights need for policies
A Burton Group report suggests that all companies should have an IM usage policy, even if they haven't deployed IM yet Continue Reading
By- Kate Dostart, Associate Editor
-
News
25 Jun 2007
Green storage gains ground
HP is just latest vendor to throw its hat into the green storage ring following Pillar Data, HDS and EqualLogic. Continue Reading
-
Feature
21 Jun 2007
Storage Decisions Downloads: Executives' storage guide
Ideas of where firms' storage should be and where it's headed. Also key ways to integrate new technologies, processes and ideas without going over budget. Continue Reading
-
News
21 Jun 2007
HP users mull blade storage
HP's "blade everything" strategy is starting to emerge in storage. Users at the HP Technology Forum this week mulled the possibilities for the technology. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
20 Jun 2007
HP to acquire SPI Dynamics for Web security
HP says it will would bolster Web site assessments and Web application vulnerabilities with its acquisition of Atlanta-based SPI Dynamics Inc. Continue Reading
By- SearchSecurity.com Staff
-
Feature
20 Jun 2007
Prevent network hacks with secure Web browsing
Hackers can penetrate your network in almost unlimited ways these days, and that includes through your Web browser. Learn how to improve Web browser security and keep these hackers out of your network. Continue Reading
-
News
19 Jun 2007
Endpoint fears drive PatchLink-SecureWave merger
Experts say the PatchLink-SecureWave merger makes sense since IT pros want a better way to protect their endpoint devices. But PatchLink's market supremacy is far from assured. Continue Reading
By -
Feature
19 Jun 2007
Big Microsoft Vista concerns for Big Pharma
The second installment of an ongoing series examining the challenges of deploying Windows Vista and the considerations that go into the decision to roll out the new OS. Continue Reading
By -
News
18 Jun 2007
Will HP do the right thing with SPI Dynamics?
Analysts say HP can dramatically boost its security with the purchase of SPI Dynamics, but some users worry about SPI's technology wilting under the new ownership. Continue Reading
By -
News
17 Jun 2007
Burton Group Catalyst Conference San Francisco 2007
SearchSecurity.com brings you the latest news, interviews, podcasts and more from the Burton Group Catalyst Conference 2007 in San Francisco. Continue Reading
-
News
17 Jun 2007
VoIP security testing fundamentals
Testing your VoIP security system against all the threats that exist on the network can be a full time job. This guide documents how a VoIP system can be tested and suggest some of the available tools to use -- with a focus on fuzzing tools and methods. Continue Reading
-
Feature
14 Jun 2007
Why hacking contests, 'month-of' projects don't help
Ivan Arce, chief technology officer of Core Security Technologies explains why he thinks hacking contests and public vulnerability disclosure projects do little to improve IT security. Continue Reading
By -
News
13 Jun 2007
Microsoft patches Windows Vista, IE 7
Microsoft fixed 15 flaws in a variety of products Tuesday, including Windows XP, Vista and Internet Explorer 7. Attackers could exploit the most serious flaws for remote code execution. Continue Reading
By -
Feature
12 Jun 2007
The Art of Software Security Testing
Identifying software security flaws including the proper methods for examining file formats. Continue Reading
-
News
10 Jun 2007
Connecting for Health briefing claims much of NHS NPfIT complete
A confidential Connecting for Health briefing paper for the prime minister has claimed that much of the NHS's £12.4bn National Programme for IT (NPfIT) is complete - although an integrated national care record system has yet to materialise, and software delivered under the scheme has been criticised by some trusts as not yet fit for purpose. Continue Reading
By -
Feature
08 Jun 2007
Data retrieval strategies: Document management software overview
The role of document management software in data storage and how it can mitigate risk for the enterprise. Continue Reading
-
Feature
08 Jun 2007
Deploying VoIP: Five things every CIO should know
Navigating the complexity of a VoIP deployment can be overwhelming and it may seem like you need a technical degree to understand it. Here are five tips to help steer through the fog of a VoIP migration. Continue Reading
By- Zeus Kerravala, Senior Vice President, Yankee Group
-
News
08 Jun 2007
Serious flaws put Yahoo Messenger users in peril
Attackers could exploit two serious flaws in Yahoo Messenger to run malicious code on targeted machines, vulnerability trackers warned Wednesday. Continue Reading
By- SearchSecurity.com Staff
-
News
08 Jun 2007
VoIP market evolves in 2007
VoIP will see market changes this year as IP PBX sales increase and market leaders shift their focus. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
07 Jun 2007
VoIP performance testing fundamentals
VoIP network performance testing can mean the difference between a VoIP system working at a high level QoS and a weak system that runs so poorly customers could take their business elsewhere. This guide discusses why it is important to run regular performance testing and some of the ways it can be done. Continue Reading
-
News
05 Jun 2007
IBM to acquire Watchfire for risk, compliance
IBM agreed to acquire Waltham, Mass.-based Watchfire Corp. to add Web application and compliance testing tools into Big Blue's Rational development platform. Continue Reading
By- SearchSecurity.com Staff
-
News
05 Jun 2007
Watchfire will help IBM build application security
Analysts have been pushing the Security 3.0 concept this week at Gartner's IT Security Summit, and one analyst says IBM's acquisition of Watchfire illustrates the trend. Continue Reading
By -
News
03 Jun 2007
IBM: We're No. 1 in storage hardware
A new combined disk and tape tracker from IDC has IBM trumpeting from the rooftops that it's the market leader. But what's IBM's story when it comes to software? Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
01 Jun 2007
Top spammer indicted on email fraud, identity theft
The arrest may reduce the volume of spam in the short-term, say experts and analysts, but the real spam threat comes from criminal gangs based in Asia and Russia. Continue Reading
By- Robert Westervelt, TechTarget
-
News
01 Jun 2007
Sclavos's VeriSign departure leaves many questions unanswered
Some industry observers say disagreements fueled his resignation, but others say Sclavos's abrupt departure revolved around his role in VeriSign's options accounting practices. Continue Reading
By- Marcia Savage, Information Security magazine
-
News
01 Jun 2007
Check Point promises more VoIP security, fewer slowdowns
Check Point's enhanced Open Performance Architecture is designed for deeper security of technologies like VoIP without the network performance problems that often come with it. Continue Reading
By -
News
01 Jun 2007
Springing leaks: Getting smart about data loss prevention
Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined. Continue Reading
By- Neil Roiter, TechTarget
-
News
01 Jun 2007
Google dives into security market
Search engine giant Google has acquired security startup GreenBorder Technologies, making it a bigger player in the wider information security market. Continue Reading
By -
News
31 May 2007
HDS CEO quits for HP storage biz
Dave Roberson, CEO of Hitachi Data Systems since 2006, has jumped ship to HP to run the server giant's storage business. Continue Reading
By- Jo Maitland, TechTarget
-
News
30 May 2007
Brocade gets into the HBA business
Experts say the move, based on a partnership with LSI, could lower HBA pricing across the board and be the first step toward a Brocade-developed storage virtualization product. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
29 May 2007
SAN School: Table of contents
What is a storage area network? What are the benefits and pitfalls of installation? How can a SAN fit into your organization? These questions and more are answered SAN School. Continue Reading
By- SearchStorage.com editors
-
Feature
25 May 2007
When Microsoft Vista and VPNs don't mix
Papa Gino's is ahead of many companies in deploying Windows Vista, thanks to its involvement in the Microsoft TAP program. But VPN compatibility has been a sticking point. Continue Reading
By -
Feature
25 May 2007
Admins run into trouble with Microsoft updates
A DNS service failure and an ongoing WSUS glitch are among this month's frustrations as IT administrators try to deploy the latest security patches from Microsoft. Continue Reading
By