Software


The New Meaning of Software Quality

Building software faster doesn't mean the software is better. What your IT organization may need is an agile quality process.

Icenium Streamlines, Simplifies Cross-Platform Mobile Development

Eliminates mobile SDK so Web Developers can leverage existing skills to build hybrid apps via a Web browser.

Q&A: Keeping Mobile Applications Secure

How can you make sure your mobile applications are secure? A security expert offers several suggestions.

5 Tips for Switching Vendors

Don't let the deluge of financial offers blind you to the best vendor for your needs. These five tips will help you make the right choice.

SecureAuth Launches Enterprise-Grade Security for Mobile Applications

Enables enterprises to secure access management of mobile applications using SecureAuth two-factor authentication, SSO.

AccelOps Adds Security, Monitoring for Amazon EC2

Integrated SIEM, performance, and availability software extends insight into Microsoft and Oracle databases, adds geo-location reporting.

Enkive Updates Open Source E-mail Archiving, E-discovery Software

Version 1.2 features new statistics engine, archive access via IMAP.



Sepaton Sets 2PB Mark for Single System Storage with Hitachi Storage Arrays

Disk-based backup can protect 2 PB in a single system.

Global IDs Releases Legal Entity Identifier Integration Suite

Designed for rapid deployment inside financial institutions.

Pravail Solution Protects Against Advanced and Insider Threats

New Network Security Intelligence monitors network traffic data, uses advanced analytics to help organizations close the security gaps left by firewalls and intrusion prevention systems.

Q&A: Moving Between Cloud Technologies

Moving from private to public or hybrid clouds can be risky. These best practices can help you avoid common traps.

Q&A: Managing Cloud Downtime

The cloud offers enterprises several economic advantages, but downtime can seriously affect your bottom line. We examine how to prepare for -- and work around -- such service interruptions.

5 Rules for Reining in Key Sprawl

Following these five rules will help your organization get your security keys under control.

Survey Says: Business as Usual for Big Iron

Shops with large mainframe investments tend to double down on Big Iron; small shops, on the other hand, are trying to wean off of them. Call it a case of expansion versus austerity.

New Nuix Solution Simplifies Collection of Large Data Sets

Enterprise Collection Center redefines enterprise collection for eDiscovery and big investigations with powerful workflows to automate the process from collection to production.

BeyondTrust Extends Risk Reduction to Entire IT Operations Team

Retina Community solution expands support for “horizontal IT” for up to 256 IPs at no cost.

Corero’s First Line of Defense Protects against DDoS, Malicious Server Targeted Attacks

New IT infrastructure perimeter solution protects where firewalls cannot.

Ixia Removes Performance-Robbing Packets from Data Center Networks

Anue Advanced Feature Module 16 cuts network traffic load in half to improve visibility into network, application, and security performance.

IBM and AT&T Planning Enterprise Cloud Service for 2013

Service will combine compute and storage infrastructure, new VPN technology.

WatchDox for SharePoint Enables Secure Sharing of Office, PDF Documents

Integrated solution allows secure, leak-free sharing of documents inside and outside the organization and on any mobile device.