Enterprise


CA Announces Integrated Content Security Management

Product offers single console for viewing security policy compliance and enterprise-wide content-related security trends.

Unsolicited E-mail: No Problem Come 2006?

An analyst's road map to a (mostly) spam-free existence

Briefs: Resetting passwords, antivirus deal

Getting colleagues’ permission to reset passwords; Central Command offers jilted Linux users antivirus discount

Utility Computing Dark Horse

CA proposes to leverage management expertise for On Demand dominance

Monitoring Change With An Intranet

Timely monitoring of critical information is key to a company's success. Dashboards offer one approach.

Briefs: IBM revamps Shark storage for disaster recovery; BMC strengthens DB2 expertise

IBM upgrades TotalStorage Enterprise Storage Server Model 800; BMC acquisition improves its position in the performance management segment of the enterprise data management market

Successful Project Management: Best Practices of World-Class Companies

Researchers shed light on what companies with successful projects do right



Revivio Takes on Mirror-Splits

Time Addressable Storage writes block-level changes in real time, letting you go back in time

Microsoft Entering Antivirus Market

Company may use assets of takeover target assets improve Windows

Briefs: IPv6 attacks, updated iQ.Suite

Guarding against IPv6 attacks; iQ.Suite strengthens Exchange 2003 e-mail security features

Security Basics: Database Access Controls

How privileges, roles, views, and row-level security are used to protect your data

Protecting Data From Events Firewalls Can't Catch

TippingPoint releases Peer-to-Peer control, intrusion prevention devices

Oracle vs. PeopleSoft: The Hostility Factor

Words—and lawsuits—fly

Has the Clock Run Out on AIX?

SCO's deadline for IBM compliance passes uneventfully

Briefs: Construct Spectrum, IM tidal wave, TestGUI

UI design tool for mainframe hosts; IM growth forecast; functional and regression testing for GUIs

Case in Point: Backing Up in a Tight Window

Round-the-clock service availability makes backup critical. Learn how an electronic trading company gets it done.

Storage and Security: How Real is the Threat?

Partially at the behest of a reader, we take a look at the storage-security nexus.

CSI/FBI Report: Losses Down, Vulnerabilities Up

Ex-FBI agent and ISS X-Force director discusses Computer Security Institute report

Briefs: Windows Server 2003 patch, worm aimed at financial institutions; Symantec's top 10 threats

Microsoft patches two Windows Server 2003 holes; Bugbear targets financial institutions; Symantec lists worst vulnerabilities from last month

Updated Tivoli Risk Manager Locks Down Databases

Software can scout for risks "autonomically”