How a new spec targets data protection on PCs, servers, mobile devices, and hard disk storage devices.
When used together, server virtualization with N-Port ID Virtualization (NPIV), blade servers, and Fibre Channel SANs provide a mature, robust infrastructure for data centers.
Both NetMaster and SysView boast GUI and usability improvements. Along with a lower-cost software licensing option and you have pair of old tools reborn.
Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.
All things considered, 2008 was a quiet but industrious year on the security front.
It was a pretty good year, for IT spending at least.
Full-disk encryption specifications developed by the Trusted Computing Group (TCG), including key management and self-encrypting drives, can keep data safe.
Adopters cite OSS' low-cost licensing, flexibility, and -- crucially -- freedom from a Microsoft lock-in as its most attractive features.
Encryption directly on the storage device provides the simplest and most effective means to obtain a trusted storage system.
An out-of-band security fix from Microsoft put administrators in a familiar but tough spot: potentially damned if they patched and damned if they didn't.
The z10 BC isn't as big or brawny as its beefy sibling, but it has lots of power and is priced to move. Call it a mainframe system for the rest of us.
Only 10 percent of organizations are actually using effective anti-spam technologies
"Going Green" is about transforming the static, reactive, and largely inert data centers of today into what proponents call a "living organism."
Why are hardware and database behemoths focusing so much attention on a segment that -- just 18 months ago -- was a relatively sleepy niche?
Symantec spent more than half a billion dollars to buy its way into the SaaS e-mail and Web security segments
McAfee's acquisition of Secure Computing could trigger a round of consolidation and disrupt the security status quo for vendors and customers alike
If you want to economize on storage for the massive amount of data you're accumulating, the choice is clear: tape.
A host of trade shows this Fall give a glimpse into what storage vendors are up to.
A new survey shows that enterprise networking groups -- not IT security pros -- are usually responsible for day-to-day NAC administration.
You don't typically think of Big Iron as a locus of Web 2.0 activity -- but IBM is trying to recast it as such