A proposal for a “three dimensional approach”: automating storage provisioning and device management, data movement, and data replication.
An often-overlooked layer of defense can provide last-ditch protection against malicious software threats.
New Vulnerabilities Steal Financial Data Via ICQ, Target P2P File Traders, and Delete Office Files
Simplifying the time-consuming process of setting up security, and changing security permissions quickly, can often be handled through procurement software.
Rather than navigating a Web site to see their data, customers at New York Life Investment Management Retirement Services enter only a username and password to see statements in an HTML e-mail attachment.
The company is querying its user base for security enhancements; meanwhile, security option defaults will be changed in future releases and updates.
Two-thirds of survey respondents say they typically aren’t aware of an application performance problem until an end-user calls the help desk. That method is costing IT big bucks—over half say downtimes exceeds $100,000 per hour.
From installation to security issues, experts offer suggestions for adding wireless access to your enterprise.
MainView enhancements support priority-based IP traffic pacing, FTP tracing and tracking features, and improved availability for CICS during upgrades.
Our recent column about historical revisionism and EMC brings immediate reader response.
E-mail fraud and vulnerabilities, plus the impact of Microsoft's source code leak
Securing common, Internet-connected, mobile devices requires a new approach. Schindler Elevator Corp. found one.
Auditing can do more than just help you meet a host of new regulations. Last week we outlined several significant business benefits. This week we explore your options. (Second in a two-part series.)
Sarbanes-Oxley; partnering for security; security certification guide
Big Blue's Data Retention 450 combines hardware, storage, and software to help companies comply with regulations such as HIPAA and SOX. The product is a direct challenger to EMC's Centera Compliance Edition.
Foundation Suite gets a new name: Storage Foundation 4.0
Company's new 64-bit Xeon chips complements 64-bit Itanium chips.
Why does an SMB need—or want—a SAN at all?
Near-real-time monitoring may help your company catch attackers and restore altered data.
Microsoft Warns of Critical ASN.1 Vulnerability; More Doom Unleashed