Enterprise software
Enterprise software covers a wide range of vital IT management decisions, from operating systems to databases, from business applications to integration and middleware. Your software purchasing and development strategy is central to delivering successful IT systems, and we examine the products and trends that help IT managers make the right choices for their organisation.
- 
				News
					24 Oct 2025
					
									
										
									
								Banks’ AI cost-cutting benefits won’t last, will ‘erode’ profits
Banks are making significant cost savings through initial artificial intelligence implementations, but the technology will eventually hit their profits Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
 
 - 
				News
					24 Oct 2025
					
									
										
									
								Government awards Post Office £2m contract to search for its own Capture records
Up to 1,500 claims expected from former users of the Post Office’s controversial Capture software Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
 
 
- 
                News
                04 Mar 2007
                
                            
                            Expert: NAC not a network security cure-all
According to an expert at Black Hat DC, NAC success demands careful planning and a good understanding of the company network; otherwise, implementations can quickly go awry. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                News
                02 Mar 2007
                
                            
                            Police force secures data with biometrics
Humberside Police has issued biometric USB drives among staff to maintain data security. Continue Reading
 - 
                News
                01 Mar 2007
                
                            
                            Linksys, Gateway launch low-end NAS
Cisco subsidiary Linksys and PC maker Gateway launch new NAS products for small businesses and consumers. Continue Reading
By- SearchStorage.com
 
 - 
                Feature
                28 Feb 2007
                
                            
                            PING with Mark Odiorne
Mark Odiorne, CISO at Scottish Re, provides insights on pen testing procedures, prioritising security for senior management and keeping compliant. Continue Reading
 - 
                News
                28 Feb 2007
                
                            
                            RFID cloning presentation moves forward despite legal threats
Chris Paget, director of research and development at IOActive spoke mainly about the science behind RFID tags and readers and the inherent security issues of the technology. Continue Reading
 - 
                Feature
                28 Feb 2007
                
                            
                            RFID dispute: Vendors still hostile toward full disclosure
Many vendors still believe that security by obscurity is still the best policy and make it a priority to silence vulnerability researchers. Continue Reading
 - 
                News
                27 Feb 2007
                
                            
                            McAfee fixes flaw in Mac antivirus software
Attackers could exploit the hole in McAfee's Virex 7.7 antivirus program for Mac OS X to bypass the malware scanner, but a fix is available. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                27 Feb 2007
                
                            
                            'Worm' targets Sun Solaris Telnet flaw
Security researchers have found evidence that a worm is trying to exploit the recently patched Telnet flaw in Sun Solaris. Experts say it's another reason to stay away from Telnet. Continue Reading
By - 
                News
                27 Feb 2007
                
                            
                            Wireless security: IT pros warily watching mobile phone threats
Security experts have warned repeatedly that mobile phone attacks will grow as the devices become more sophisticated. IT administrators are starting to believe them. Continue Reading
By - 
                News
                26 Feb 2007
                
                            
                            HP acquires clustered file system software maker PolyServe
HP announced its intent to acquire clustered file system maker PolyServe. Continue Reading
By- Jo Maitland, TechTarget
 
 - 
                News
                26 Feb 2007
                
                            
                            Storm rages again: Self-morphing Trojan uses blogs to spread rootkits
A new variant of the Storm Trojan that changes with each download is infecting blog sites with malicious URLs, intercepting traffic when visitors try to post comments. Continue Reading
By - 
                News
                25 Feb 2007
                
                            
                            HP announces iSCSI VTL for SMBs
HP's new iSCSI VTL devices include automated backup capabilities for users with fewer than four servers. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                25 Feb 2007
                
                            
                            PatchLink acquires STAT Guardian tool
PatchLink says it will add more muscle to its vulnerability management portfolio by acquiring the STAT Guardian tool from IT vendor Harris Corp. Continue Reading
By - 
                News
                25 Feb 2007
                
                            
                            Does an organization have to have an IP PBX in order to have a unified communications system?
Does an organization have to have an IP PBX in order to have a unified communications system? Continue Reading
By- TechTarget Staff
 
 - 
                Feature
                22 Feb 2007
                
                            
                            Microsoft takes a blogosphere beating over Vista UAC
This week in Security Blog Log: Industry experts take Microsoft to task over a "very severe hole" in the design of Vista's User Account Controls (UAC) feature. Continue Reading
 - 
                News
                22 Feb 2007
                
                            
                            Google offers 10 GB inbox
The search engine giant is offering an email application on a subscription basis with five times the storage capacity of the free version. Continue Reading
By- SearchStorage.com Staff
 
 - 
                Feature
                22 Feb 2007
                
                            
                            Flaws haunt Symantec, IBM, Cisco and IE
Bug Briefs: Security holes plague Symantec Norton products, IBM DB2; Mozilla Firefox; Trend Micro ServerProtect; Cisco IP phones; Google Desktop; IE and Snort. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                21 Feb 2007
                
                            
                            Cisco warns of IP phone flaws
Attackers could circumvent security restrictions by exploiting flaws in certain Cisco IP phones, the networking giant warned Wednesday. Continue Reading
By - 
                Feature
                21 Feb 2007
                
                            
                            Data breach: If customers don't act, data will remain at risk
To make enterprises take data security seriously, customers must take control of their personally identifiable information and stop handing it out to businesses. Continue Reading
 - 
                News
                20 Feb 2007
                
                            
                            Cisco to acquire Reactivity for $135 million
One analyst says Cisco will benefit from Reactivity's policy and threat management capabilities. Continue Reading
By - 
                News
                20 Feb 2007
                
                            
                            Microsoft confirms new IE flaw
Attackers could exploit a new flaw in Internet Explorer (IE) to access local files on targeted systems, Microsoft confirmed Tuesday. Continue Reading
By - 
                News
                20 Feb 2007
                
                            
                            Google plugs dangerous flaw
An attacker could exploit a hole in Google Desktop to gain access to users' personal files. Google has released a patch, but experts say not all users are receiving it. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                News
                19 Feb 2007
                
                            
                            Sourcefire fixes Snort flaw
Attackers could exploit a flaw in the popular open source Snort IDS tool to cause a denial of service or launch malicious code. Continue Reading
By - 
                News
                19 Feb 2007
                
                            
                            When security firms merge, some users are losers
Some users see their services improve when IT security vendors merge with other companies or get acquired. Others say they've been left out in the cold. Continue Reading
By - 
                News
                19 Feb 2007
                
                            
                            What is unified communications?
Defining unified communications. Continue Reading
By- TechTarget ANZ staff
 
 - 
                News
                19 Feb 2007
                
                            
                            What is communication-enabled-business processes (CEBP)?
Defining communication-enabled business processes. Continue Reading
 - 
                Feature
                15 Feb 2007
                
                            
                            Questions fly as EMC Retrospect fades
All signs point to the end of life for EMC's Retrospect backup software for small businesses. Sources say the company cannot support an SMB software channel. Continue Reading
 - 
                Feature
                13 Feb 2007
                
                            
                            Inside MSRC: Microsoft explains security bulletins
Microsoft issued 12 new security bulletins in February. Christopher Budd of the Microsoft Security Response Center provides information about the most important fixes. Continue Reading
 - News 12 Feb 2007
 - 
                News
                12 Feb 2007
                
                            
                            Mobile carriers admit to malware attacks
Eighty-three percent of mobile operators surveyed by McAfee Inc. say they've suffered malware infections, but two competing security vendors say the overall threat is still small. Continue Reading
By - 
                News
                12 Feb 2007
                
                            
                            Microsoft fixes zero-day flaws in Word, Office
Twelve security updates from Microsoft fix a range of problems, including a flaw in the Malware Protection Engine and previously-exploited zero-days glitches in Word and Office. Continue Reading
By - 
                News
                12 Feb 2007
                
                            
                            Skype makes more enterprise inroads
Skype has teamed with FaceTime Communications to give companies more control over Skype use within the enterprise. Continue Reading
By- Andrew R. Hickey, Senior News Writer
 
 - 
                News
                11 Feb 2007
                
                            
                            Cybersecurity czar signals government cooperation at RSA Conference
Cybersecurity chief, Greg Garcia told RSA Conference attendees that government, enterprises and academia need to work together to fight growing Internet threats. Continue Reading
By- Marcia Savage, Features Editor, Information Security Magazine
 
 - 
                News
                11 Feb 2007
                
                            
                            Solaris 10 has zero-day Telnet flaw
Attackers could exploit a zero-day flaw in Solaris 10's Telnet daemon to bypass authentication and gain unauthorized system access, security experts warn. Continue Reading
By - 
                News
                10 Feb 2007
                
                            
                            Cisco VoIP management guide: VoIP management lifecycle
VoIP lifecycle management enables enterprises to safely pursue large production deployments. The management lifecycle includes the following four elements. Continue Reading
 - 
                News
                10 Feb 2007
                
                            
                            Cisco VoIP managment guide: Required management tasks
Comprehensive VoIP management includes the basic network management tasks, but also includes monitoring services such as dial tone delivery, call success rates, telephony delays and impairments, as well as call quality. VoIP telephony management is categorized here. Continue Reading
 - 
                News
                08 Feb 2007
                
                            
                            Roundup: Vista security, breakability touted at RSA Conference
At RSA Conference 2007, Microsoft extolled the security virtues of its new operating system, but others weren't afraid to demonstrate how Vista security is lacking. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                08 Feb 2007
                
                            
                            New storage IPOs report losses
Of the 2006 "graduating class" of storage IPOs, two reported losses this week in their first quarter as public companies. Continue Reading
By- SearchStorage.com Staff
 
 - 
                News
                07 Feb 2007
                
                            
                            VoIP capabilities save hotel money, keep guests connected
"Rip and replace" were three words the Seaport Hotel in Boston didn't want to hear when considering VoIP capabilities. Continue Reading
By- Andrew R. Hickey, Senior News Writer
 
 - 
                News
                07 Feb 2007
                
                            
                            Briefs: Vulnerabilities found in Trend Micro, Firefox browser
This week, Trend Micro released a fix for a flaw in its antivirus engine, while no fixes are available for two newly discovered Mozilla Firefox browser flaws. Continue Reading
By- Edmund X. DeJesus, Contributor
 
 - 
                News
                07 Feb 2007
                
                            
                            EMC plans array-based encryption via PowerPath
EMC's next security move will be array-based encryption through PowerPath by 2008, according to internal documents obtained by SearchStorage. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                06 Feb 2007
                
                            
                            VoIP predictions for 2007: Best bets from VoIP experts
How will the VoIP and networking markets evolve over 2007? SearchVoIP experts, Carrie Higbie and Juan Pablo Pazos, and our valued site members, put their cards on the table about the 2007 VoIP market and other important networking trends. Continue Reading
By- Amy Kucharik, TechTarget
 
 - 
                News
                05 Feb 2007
                
                            
                            What are the disadvantages of unified storage over independent block and file systems?
There are some compromises that you'll need to make; there are certainly some control granularity issues. The pattern of access for file-based data and block-based data is significantly different... Continue Reading
 - 
                News
                05 Feb 2007
                
                            
                            Is there any reliability difference with unified storage?
There are a few minor differences, but usually not a significant difference... Continue Reading
 - 
                News
                05 Feb 2007
                
                            
                            CA backup bug exploitable on Vista
In what appears to be the first exploit for a third-party app running on Vista, a previously patched buffer overflow vulnerability in CA BrightStor ARCserve Backup has been exploited. One security firm says ISVs aren't taking advantage of Vista's new security features. Continue Reading
By- Michael Mimoso, TechTarget
 
 - 
                News
                05 Feb 2007
                
                            
                            What does unified storage really mean?
This can often be confusing once you read vendors' marketing materials. Simply stated, unified storage [or multiprotocol storage] refers to a single storage system that can support both file and block access... Continue Reading
 - 
                News
                05 Feb 2007
                
                            
                            What is the advantage of having unified storage?
There is debate about that. Many customers may prefer to have just one storage system, avoiding specialized storage systems, like NAS for file-based access or a complicated block-based storage system... Continue Reading
 - 
                News
                05 Feb 2007
                
                            
                            What about the system features, like snapshot and remote replication?
At this point in time, most customers expect to have these features in both block- and file-based storage products... Continue Reading
 - 
                News
                05 Feb 2007
                
                            
                            What will be the impact on performance when mixing block and file in the same system?
Caching difficulties are one concern since caching patterns may not be optimized for block-based storage... Continue Reading
 - 
                News
                05 Feb 2007
                
                            
                            Do all the vendors offer unified storage?
No. Some vendors are moving in that direction and others have a limited number of OEM product offerings now. However, several vendors currently offer established products... Continue Reading
 - 
                News
                05 Feb 2007
                
                            
                            Acopia hypes heterogeneous snapshot
The file virtualisation startup is blustering about a demonstration of heterogeneous snapshot technology, but is being coy about releasing a product. Continue Reading
By- SearchStorage.com Staff
 
 - 
                News
                05 Feb 2007
                
                            
                            Symantec chief: Consumer confidence in data protection is key to online growth
In his keynote at RSA Conference 2007, Symantec CEO John W. Thompson said Big Yellow is ready for the shifting dynamics in the information security market, and implied that Microsoft's growing presence in security is a conflict of interest for its customers. Continue Reading
By- Rob Westervelt, News Editor
 
 - 
                News
                05 Feb 2007
                
                            
                            Rootkit dangers at an 'all-time high'
Industry experts at RSA Conference 2007 say not only have rootkits become the weapon of choice for malicious hackers, but they've also emerged as useful tools for legitimate businesses trying to exert control over users. Continue Reading
 - 
                News
                05 Feb 2007
                
                            
                            Coviello: In 3 years, no more stand-alone security
RSA President Art Coviello says today's patchwork of monolithic security devices will disappear in the next three years as security is integrated into the larger IT infrastructure. Continue Reading
By - 
                News
                05 Feb 2007
                
                            
                            Gates touts secure access anywhere
Microsoft's chairman tells RSA Conference 2007 attendees that a combination of authentication and access management strategies is what it takes to protect corporate data, but information security pros are willing to wait for the proof. Continue Reading
By- Michael Mimoso, TechTarget
 
 - 
                News
                05 Feb 2007
                
                            
                            Does it cost extra for unified storage?
For a lot of NAS-based systems -- even Windows Storage Server (WSS) with an iSCSI target unified storage capability is probably... Continue Reading
 - 
                News
                04 Feb 2007
                
                            
                            Vista exploitable, researcher says
Marc Maiffret, CTO and chief hacking officer of eEye Digital Security, said he has found a way to elevate system privileges by exploiting a flaw in Windows Vista. Continue Reading
By - 
                News
                04 Feb 2007
                
                            
                            CISOs mastering 'softer' skills
Why CISOs can no longer rely on technology skills alone and what businesses are looking for when recruiting their next information security leader. Continue Reading
By- Amber Plante, Assistant Managing Editor, Information Security magazine
 
 - 
                News
                04 Feb 2007
                
                            
                            Email security buying decisions
Email security can be a daunting task for SMBs -- how do you go about finding the right product? This tip delves into three approaches to email security and the products available. Continue Reading
By- Joel Dubin, CISSP, Contributor
 
 - 
                News
                04 Feb 2007
                
                            
                            Dozens of Web sites spread malicious Trojan
Update: The same malicious JavaScript keylogger that compromised the Dolphin Stadium Web site last week was found over the weekend on dozens of other high-profile Web sites. Continue Reading
By- Eric Parizo, Senior Analyst
 
 - 
                News
                04 Feb 2007
                
                            
                            New zero-day attack targets Microsoft Excel
Microsoft says maliciously crafted Excel files may permit the execution of arbitrary code. Other Microsoft Office applications may be at risk. Continue Reading
By- Edmond X. DeJesus, Contributor
 
 - 
                News
                04 Feb 2007
                
                            
                            HDS to acquire Archivas for up to $120M
HDS will acquire archiving software partner, Archivas for close to $120 million stepping up its effort to compete with EMC in this market. Continue Reading
By- Jo Maitland, TechTarget
 
 - 
                News
                04 Feb 2007
                
                            
                            HP fills in gaps with product updates
HP announced updates to several of its products, but analysts are wondering what its ultimate strategy will be for storage virtualisation. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                04 Feb 2007
                
                            
                            Intrusion detection systems are alive and kicking
IPS hasn't overtaken intrusion detection systems just yet. Senior News Writer Bill Brenner reveals what customers want when they're shopping for IDS products. Continue Reading
By - 
                Feature
                31 Jan 2007
                
                            
                            New security vendors take on sophisticated attackers
IT Security vendors are developing technologies that show promise in preventing unknown attacks and protecting machines with zero-day vulnerabilities. Continue Reading
 - 
                News
                31 Jan 2007
                
                            
                            Open source ID projects link up with Microsoft
Higgins-Bandit groups develop a new open source tool that could make independent ID systems compatible with Microsoft Windows CardSpace program. Continue Reading
By - 
                News
                31 Jan 2007
                
                            
                            Unified communications to fuel PBX growth
Unified communications will help push the PBX market to $7.5 billion over the next four years, according to recent research by the Dell'Oro Group. Continue Reading
By- Andrew R. Hickey
 
 - 
                News
                30 Jan 2007
                
                            
                            Symantec exploitation video hits YouTube
Symantec posted a clip on the popular video-sharing site showing researchers using a newly discovered flaw in Microsoft Word to drop an executable on a vulnerable machine. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                30 Jan 2007
                
                            
                            Windows Vista voice command tricked
An attacker found a way to play audio commands at a user's machine tricking the voice command capability in Vista into running arbitrary code. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                30 Jan 2007
                
                            
                            Microsoft disputes Word zero-day report
Symantec is warning of a new zero-day vulnerability in Microsoft Word. But Microsoft doesn't believe the flaw is new. Continue Reading
By - 
                News
                30 Jan 2007
                
                            
                            Lawyers discuss e-discovery gotchas
During panel sessions at Legal Tech, lawyers provided their insights into the e-discovery process, retention policies and helping judges get up to speed. Continue Reading
By- Jo Maitland, TechTarget
 
 - 
                News
                30 Jan 2007
                
                            
                            Symantec unveils 'universal ID system'
Symantec said the goal is to create a universally accepted identity system across all Web sites -- from online financial institutions to retailers -- for millions of consumers. Continue Reading
By- SearchSecurity.com Staff
 
 - 
                News
                30 Jan 2007
                
                            
                            Using IAM tools to improve compliance
Provisioning and password management tools can ease complexity, reduce help desk calls and save money. But they also have an added benefit: they can help with your compliance woes. Continue Reading
 - 
                News
                29 Jan 2007
                
                            
                            Hybrid drives hit NAS boxes
DNF will be making hybrid drives available in all of its storage products, but it doesn't recommend them for IP SANs. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                29 Jan 2007
                
                            
                            Managed VoIP -- 10 tips for a smooth migration
Migrating to managed VoIP doesn't have to be a headache. Here, Verizon Business offers 10 top tips to ensure you get what you need. Continue Reading
By- Andrew R. Hickey, Senior News Writer
 
 - 
                News
                29 Jan 2007
                
                            
                            TJX faces lawsuit over data breach
A class action lawsuit against TJX accuses the retailer of negligence for not doing enough to secure customer data and for keeping quiet about the breach for a month. Continue Reading
By - 
                News
                28 Jan 2007
                
                            
                            IBM improves data recovery process for TSM users
Tivoli Storage Manager 5.4, released this week, establishes a disk cache for most recently backed-up files, improving the slow restore times associated with the product. Continue Reading
By- Jo Maitland, TechTarget
 
 - 
                News
                28 Jan 2007
                
                            
                            IBM to acquire Softek, looks to pump up services biz
IBM says it intends to use Softek's Transparent Data Migration Facility within its Global Services business. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                28 Jan 2007
                
                            
                            Brocade unveils McData integration roadmap
McData's directors and FICON routers will remain separate product lines for now; McData's SAN management software will replace Brocade's Fabric Manager. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                25 Jan 2007
                
                            
                            Balancing the cost and benefits of countermeasures
The final tip in our series, "How to assess and mitigate information security threats." Continue Reading
 - 
                News
                25 Jan 2007
                
                            
                            Malware: The ever-evolving threat
The first tip in our series, "How to assess and mitigate information security threats" Continue Reading
 - 
                News
                25 Jan 2007
                
                            
                            Network-based attacks
The second tip in our series, "How to assess and mitigate information security threats." Continue Reading
 - 
                News
                25 Jan 2007
                
                            
                            Information theft and cryptographic attacks
The third tip in our series, "How to assess and mitigate information security threats." Continue Reading
 - 
                News
                25 Jan 2007
                
                            
                            IBM tool makes online purchases anonymous
A new tool makes online purchases anonymous by using artificial identity information. Experts say enterprises need to adopt the technology before it can become a viable option. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                News
                25 Jan 2007
                
                            
                            Symantec makes major update to Enterprise Vault
Symantec adds automated data classification and integration with security products in Version 7.0 of its Enterprise Vault archiving tool; EMC reports record earnings for the fourth quarter. Continue Reading
By- SearchStorage.com Staff
 
 - 
                News
                25 Jan 2007
                
                            
                            Apple fixes Mac Wi-Fi flaw
The Mac OS X Wi-Fi flaw Apple fixed on 24 Jan was first disclosed as part of the Month of Kernel Bugs in November. Attackers could exploit it to crash the targeted system. Continue Reading
By - 
                News
                24 Jan 2007
                
                            
                            iSCSI SANs grow in midmarket, enterprise
Because transporting "SCSI over IP" leverages ubiquitous Ethernet networks, that translates to lower cost, easier maintenance and simpler management, which makes SAN deployment more attractive for SMEs. Continue Reading
 - 
                News
                24 Jan 2007
                
                            
                            Microsoft investigates new Word zero-day
An unpatched memory-corruption flaw in Microsoft Word is the target of "limited" attacks in the wild, Microsoft confirmed Thursday. Continue Reading
By - 
                News
                24 Jan 2007
                
                            
                            TJX data breach info used to make fraudulent purchases
Fraudulent purchases have been reported globally, according to a trade association that represents more than 200 banks in Massachusetts. Continue Reading
By- Robert Westervelt, TechTarget
 
 - 
                News
                24 Jan 2007
                
                            
                            Microsoft, Nortel introduce new unified communications apps
Microsoft and Nortel's Innovative Communications Alliance takes unified communications to the next level with its latest combined applications. Continue Reading
By- Kate Dostart
 
 - 
                News
                23 Jan 2007
                
                            
                            Cisco fixes IOS flaws
Attackers could exploit three Cisco IOS flaws to cause a denial of service or launch malicious code. The networking giant has released fixes. Continue Reading
By - 
                News
                23 Jan 2007
                
                            
                            Veracode launches on-demand code analysis service
New start up Veracode gives customers the ability to analyse the application binary, and not simply the source code. Continue Reading
 - 
                News
                23 Jan 2007
                
                            
                            McAfee: Malware all about ID theft
The use of keylogger technology is surging and there's been a 100-fold rise in phishing attacks, according to a new report from McAfee. Continue Reading
By- Bill Brenner, Senior News Writer
 
 - 
                Feature
                18 Jan 2007
                
                            
                            Vendors: Cut the hype, truth is what sells
Storage virtualisation technologies have been purchased and implemented successfully for years. The rest of the IT infrastructure must try to catch up and, ultimately, the only thing not virtualised within the datacentre will be the last guy standing. Continue Reading
By- Steve Duplessie, founder and senior analyst for the Enterprise Strategy Group
 
 - 
                News
                18 Jan 2007
                
                            
                            How can click-to-dial (click-to-call) be enabled at remote offices?
We've just installed Mitel 3300's across three sites and are looking to complete click-to-dial (click-to-call) for users utilizing Outlook 2003. The calls will then be pushed out via a 5340 handset. We can achieve this locally from our main site, though the option to click-to-dial (click-to-call) is disabled or greyed out for regional offices using Citrix Presentation 4 server. Do you have any suggestions? Continue Reading
By- SearchVoIP Staff
 
 - 
                Feature
                17 Jan 2007
                
                            
                            TJX breach: There's no excuse to skip data encryption
Companies complain that database encryption products are too expensive and difficult to manage, but customer loss and breach notification costs outweigh encryption expenses. Continue Reading
 - 
                News
                17 Jan 2007
                
                            
                            Companies take IM threats seriously
Wesabe is a brand new money management community. It takes threats to IM as seriously as those targeting email and web applications Continue Reading
By - 
                Feature
                16 Jan 2007
                
                            
                            EqualLogic CEO says IPO on the way
EqualLogic's CEO talks about the company's plans to go public, its intent to add 10 GigE to its products and why he thinks not all iSCSI products are created equal. Continue Reading
By- Beth Pariseau, Senior News Writer
 
 - 
                News
                16 Jan 2007
                
                            
                            Fortify Software to acquire Secure Software
The acquisition of Secure Software will allow Fortify to expand into the requirements and design phases of the software development lifecycle, the company said. Continue Reading
By - 
                News
                15 Jan 2007
                
                            
                            Core Security offers powerful testing tool
We highly recommend Core Impact 6.0 to security engineers to verify the vulnerability of their networks. Continue Reading
By- Mike Poor, Contributing Writer
 
 
