As cyberfelons continue to attack simple host-based firewalls, antirust, and antispam measures, IT needs to be increasingly attentive to its endpoint defenses.
After years of animosity, Intel and Sun have patched things up. Why? What’s the catch?
Security and compliance policies are only successful if they are enforced. That’s where network access control comes in.
We sort out the options with the most buzz for 2007—NAC, Vista, and NAP—for enforcing security with devices requesting network resources.
The year was something of a mixed bag, milestone-wise. We offer five trends to watch in 2007.
Mainframe operators need unobstructed visibility into the performance of their IP networks, too.
Project Blackbox might be a gimmick, but Sun’s virtualization moves are for real
Customers can service-enable terminal-based applications and effectively transform them into full-fledged SOA assets
What does ISS give IBM—and is it worth the $1.6 billion Big Blue paid for it? That depends, analysts say.
By putting $4.5 billion of its money where its mouth is, has HP finally put the lie to the canard that it isn’t serious about software?
No, Systems Network Architecture (SNA) isn’t making a comeback. Instead, Nortel’s Secure Network Access (also SNA) deliverable is the latest take on a hot new network security paradigm
Organizations do successfully manage people and process changes en route to large scale enterprise transformations. Here’s how.
A new appliance acts as a meta-broker to the wild profusion of competing network access control schemes
If you think you’ve got a lot more on your plate these days, you’re probably right
There’s an ugly downside to many of the utility computing technologies on the market today
IBM’s new virtual desktop solution emphasizes a centralized, host-based infrastructure and a lightweight, terminal-esque desktop—and virtualization, too
Support for z/OS is still gestating, however, and extending TotalStorage Productivity Center to OS/400 will be difficult, too.