Enterprise


Case Study: Watching Sensitive Database Information at Toro

Sarbanes-Oxley, the need to improve monitoring, and a desire to move administration and accountability closer to end users, drove Toro to invest in record-level enterprise application monitoring software from Prodigen.

Briefs

Using investigations to satisfy Sarbanes-Oxley requirements; learning from 2003's vulnerability onslaught

SCO/IBM: Readers Respond

Strong responses mostly positive

IBM's Latest Blades Show Slim Is In

All grown up, blade servers are seen as a complement to mainframe and large Unix systems. Now they're slimmer than ever—just one of recent trends in this hardware.

Apple Joins Big Unix Server Race with Xserve G5 and Xgrid

Apple claims the new server packs about 60 percent more punch that the previous G4.

Resolutions for 2004: My Suggestions for Storage Vendors

Our storage columnist offers vendors four simple goals for the year ahead.



BRIEFS: Network Storage Rules; Anti-Virus Software; Choosing a Mail Filter

Learn Network Storage Security Rules; Free Anti-Virus (For A Year)

Report: Last Year Was Worst Ever for Viruses

Last year was the worst year ever for vulnerabilities, says anti-virus software maker F-Secure, in part because virus writers and spammers got together. Here's what you can do to prepare.

Which Bugs Will Bite? Vulnerability Predictions for 2004

Heterogeneous attacks, voice over IP shakedown, and prime time Web services easing security: predictions from an eminent security researcher for 2004 and beyond.

The New Document Specialist?

IBM makes its third document-management acquisition as retention regulations spur market growth.

Q&A: One IDE to Rule Them All

The Eclipse Project, an open source development initiative, is growing by leaps and bounds.

SCO Fine Tunes Its Claims; Court Deadline Looms

A preliminary ruling in December sets this week as the deadline for providing specific Linux code misappropriation examples to IBM. "Derivative works" is the focus of SCO's argument.

Setting Up Policies the Arkivio Way

While many products today talk a good game about policy-based data management, Arkivio is once again ahead of the pack.

Q&A: Arresting Bugs Earlier in Development Cycle Cuts Security Costs

How integrating security code testing into the development cycle saves time and dollars

Mainframe Security: Good Enough for the 21st Century?

The mainframe is the hub of a network of connected devices, making it ever more vulnerable to attacks.

Commentary: Solving Internet Crime Needs International Approach

Governments have made cyber-crime a matter of public policy. But without an organized, multi-disciplinary, international approach, the problem will remain.

Alerts: Linux Vulnerabilities, Security Spending, Symantec's List of Top Threats in November

From Linux synchronization and denial of service attacks to some good news about spending on security—a quick look at this week's other security news.