Enterprise


Aligning Storage Costs with Business Priorities

A proposal for a “three dimensional approach”: automating storage provisioning and device management, data movement, and data replication.

Compartmentalize Your Network to Improve Security

An often-overlooked layer of defense can provide last-ditch protection against malicious software threats.

Alerts

New Vulnerabilities Steal Financial Data Via ICQ, Target P2P File Traders, and Delete Office Files

Q&A: Managing Security Through Enterprise Procurement

Simplifying the time-consuming process of setting up security, and changing security permissions quickly, can often be handled through procurement software.

Case Study: Meeting Customer Demand for Secure Statements

Rather than navigating a Web site to see their data, customers at New York Life Investment Management Retirement Services enter only a username and password to see statements in an HTML e-mail attachment.

Microsoft Says Security Improvements Coming

The company is querying its user base for security enhancements; meanwhile, security option defaults will be changed in future releases and updates.

Solving Application Problems: IT Still Stuck in Reactive Mode

Two-thirds of survey respondents say they typically aren’t aware of an application performance problem until an end-user calls the help desk. That method is costing IT big bucks—over half say downtimes exceeds $100,000 per hour.



How to Avoid Problems When Wireless-Enabling Your Application Infrastructure

From installation to security issues, experts offer suggestions for adding wireless access to your enterprise.

BMC Tweaks MainView, InTune

MainView enhancements support priority-based IP traffic pacing, FTP tracing and tracking features, and improved availability for CICS during upgrades.

Bringing Order to the Storage Universe?

Our recent column about historical revisionism and EMC brings immediate reader response.

Briefs

E-mail fraud and vulnerabilities, plus the impact of Microsoft's source code leak

Case Study: Fielding Service Calls Securely

Securing common, Internet-connected, mobile devices requires a new approach. Schindler Elevator Corp. found one.

Effective Data Auditing for Regulatory Compliance: Options and Considerations

Auditing can do more than just help you meet a host of new regulations. Last week we outlined several significant business benefits. This week we explore your options. (Second in a two-part series.)

Alerts

Sarbanes-Oxley; partnering for security; security certification guide

IBM Announces New Compliance Offering

Big Blue's Data Retention 450 combines hardware, storage, and software to help companies comply with regulations such as HIPAA and SOX. The product is a direct challenger to EMC's Centera Compliance Edition.

Veritas Overhauls Storage Management

Foundation Suite gets a new name: Storage Foundation 4.0

Intel’s 64-bit Flip-Flop

Company's new 64-bit Xeon chips complements 64-bit Itanium chips.

Going After the SMB Market

Why does an SMB need—or want—a SAN at all?

Q&A: Real-Time Database Monitors May Ease Regulatory Headaches

Near-real-time monitoring may help your company catch attackers and restore altered data.

Security Briefs

Microsoft Warns of Critical ASN.1 Vulnerability; More Doom Unleashed