Can the combined will of Microsoft, Cisco, and EMC overcome the ingrained inertia of government bureaucracy?
There’s lots of buzz about NAC, but what is it exactly, and why does IT already need a new approach to the technology?
As cyberfelons continue to attack simple host-based firewalls, antirust, and antispam measures, IT needs to be increasingly attentive to its endpoint defenses.
After years of animosity, Intel and Sun have patched things up. Why? What’s the catch?
Security and compliance policies are only successful if they are enforced. That’s where network access control comes in.
We sort out the options with the most buzz for 2007—NAC, Vista, and NAP—for enforcing security with devices requesting network resources.
The year was something of a mixed bag, milestone-wise. We offer five trends to watch in 2007.
Mainframe operators need unobstructed visibility into the performance of their IP networks, too.
Project Blackbox might be a gimmick, but Sun’s virtualization moves are for real
Customers can service-enable terminal-based applications and effectively transform them into full-fledged SOA assets
What does ISS give IBM—and is it worth the $1.6 billion Big Blue paid for it? That depends, analysts say.
By putting $4.5 billion of its money where its mouth is, has HP finally put the lie to the canard that it isn’t serious about software?
Organizations do successfully manage people and process changes en route to large scale enterprise transformations. Here’s how.
No, Systems Network Architecture (SNA) isn’t making a comeback. Instead, Nortel’s Secure Network Access (also SNA) deliverable is the latest take on a hot new network security paradigm
A new appliance acts as a meta-broker to the wild profusion of competing network access control schemes
If you think you’ve got a lot more on your plate these days, you’re probably right