Enterprise


Case Study: Stopping Leaks of Program Code

Using pattern matching with information taxonomy tools to track sensitive information leaving the company

Human Error Tops List of Vulnerabilities

Only half of respondents in a new survey say their company has a written security policy. Furthermore, despite the increases in threats, many organizations have been slow to make the appropriate investments in time and budget to properly address them.

Q&A: Long-Distance Disaster Recovery

While the distance limitations of the technology remain unchanged, vendors have been demonstrating that extended-distance clusters can work

IBM Acquires Monitoring-Toolmaker Candle

Big Blue fills in gaps in its systems management portfolio by buyout of 28-year-old company.

The Changing Face of Host Integration

Rather than moving host applications off the mainframe to save money, analysts suggest that it's time to look into service-oriented architecture

The Sun Also Rises ... And Sets ... And Rises ...

Sun announces a development partnership with AppIQ, which offers a combo storage resource management/SAN management product called StorageAuthority Suite.

Q&A: Single-System Message Management

It's not just a matter of blocking unsolicited e-mail. Today's security professionals need to protect against outbound as well as inbound problems.



Security Managers Report Virus Problem Worse

New report charts security manager dissatisfaction

F-Secure Targets Attacks on Linux

As popularity of Linux grows, company predicts increasing attempts to create malicious programs that will attack it

HP Announces Preloaded Linux on Enterprise Desktops

Move could significantly build momentum for the open-source operating system; IBM also announced that SuSE Linux will be a pre-loaded option across all of its eServer systems

Unisys: The Other Mainframe

Unisys' enhanced ClearPath Libra mainframe line can run a variety of operating systems and supports multiple processors; the company also announced a new pricing model for temporary increases in computing capacity

Software Licensing Models Will Change in 2005, IDC Predicts

Researcher foresees move to a subscription-based model by 2010

Can Networking Guys Do Storage?

Acopia is a network-turned-storage-focused company with a new product for managing the network resources that support file access and data movement.

Q&A -- Looking Back, Looking Ahead at the Mainframe

IBM's zSeries marketing manager reviews the mainframe's accomplishments, and explains how mainframes are being deployed today.

Combating Apathy with Free Security Check

WholeSecurity gives businesses the ability to offer their customers an opt-in PC security sweep to quarantine malicious software

Briefs: Vulnerabilities in CPanel, ISS products, Symantec Internet Security

New warnings about Web hosting control panel protection, ISS server-response processing, and Symantec's security software

Best Practices: New Standard Helps Companies Prove Their World-Class Security

Interest is growing in a new British Standard—BS7799—that is slowly being adopted outside of Britain; companies adopting the standard may find they've implemented a best-practices security program.

IBM Claims NT-to-Linux Migration Successes

Business partners are making money from Linux, Big Blue tells conference attendees.

View from the Crossroads: Can iSCSI Make Storage Management Friendly?

A widely respected storage veteran looks at connectivity issues, including SCSI/iSCSI, plus Microsoft and storage management.

Case Study: Hardware Consolidation Reduces Management and Maintenance Costs

With newer and more powerful SunFire systems—and fewer of them—The Chicago Tribute cut costs and implemented a more efficient network configuration.