Networking


CA Unveils Host-Based Intrusion Prevention System

As cyberfelons continue to attack simple host-based firewalls, antirust, and antispam measures, IT needs to be increasingly attentive to its endpoint defenses.

Analysis: Intel, Sun Tie the Knot

After years of animosity, Intel and Sun have patched things up. Why? What’s the catch?

Why It’s Time for Network Access Control

Security and compliance policies are only successful if they are enforced. That’s where network access control comes in.

NAC, Vista, and Your Security Strategy

We sort out the options with the most buzz for 2007—NAC, Vista, and NAP—for enforcing security with devices requesting network resources.

Enterprise IT: Five Predictions for 2007

The year was something of a mixed bag, milestone-wise. We offer five trends to watch in 2007.



WDS FERRETs Out SNA-to-IP Bottlenecks

Mainframe operators need unobstructed visibility into the performance of their IP networks, too.

Sun’s Virtualization Push

Project Blackbox might be a gimmick, but Sun’s virtualization moves are for real

Seagull’s BlueZone: Terminal Emulation with an SOA-Friendly Tip

Customers can service-enable terminal-based applications and effectively transform them into full-fledged SOA assets

Analysis: Behind Big Blue’s $1.6 Billion Acquisition of ISS

What does ISS give IBM—and is it worth the $1.6 billion Big Blue paid for it? That depends, analysts say.

HP Bets Big on Software with Mercury Interactive Purchase

By putting $4.5 billion of its money where its mouth is, has HP finally put the lie to the canard that it isn’t serious about software?

SNA and the Hot New Network Security Paradigm

No, Systems Network Architecture (SNA) isn’t making a comeback. Instead, Nortel’s Secure Network Access (also SNA) deliverable is the latest take on a hot new network security paradigm

Business Process Success: Advice from an Expert

Organizations do successfully manage people and process changes en route to large scale enterprise transformations. Here’s how.

An Rx for Network Authentication Anarchy

A new appliance acts as a meta-broker to the wild profusion of competing network access control schemes

Careers: Study Shows You're Working Harder than Ever

If you think you’ve got a lot more on your plate these days, you’re probably right

Taking Control of Data Center Automation

There’s an ugly downside to many of the utility computing technologies on the market today

IBM Offers New Take on Thin-Client Computing

IBM’s new virtual desktop solution emphasizes a centralized, host-based infrastructure and a lightweight, terminal-esque desktop—and virtualization, too

IBM Revamps Flagship Storage Resource Management Suite

Support for z/OS is still gestating, however, and extending TotalStorage Productivity Center to OS/400 will be difficult, too.