MainView enhancements support priority-based IP traffic pacing, FTP tracing and tracking features, and improved availability for CICS during upgrades.
Our recent column about historical revisionism and EMC brings immediate reader response.
E-mail fraud and vulnerabilities, plus the impact of Microsoft's source code leak
Securing common, Internet-connected, mobile devices requires a new approach. Schindler Elevator Corp. found one.
Auditing can do more than just help you meet a host of new regulations. Last week we outlined several significant business benefits. This week we explore your options. (Second in a two-part series.)
Sarbanes-Oxley; partnering for security; security certification guide
Big Blue's Data Retention 450 combines hardware, storage, and software to help companies comply with regulations such as HIPAA and SOX. The product is a direct challenger to EMC's Centera Compliance Edition.
Foundation Suite gets a new name: Storage Foundation 4.0
Company's new 64-bit Xeon chips complements 64-bit Itanium chips.
Why does an SMB need—or want—a SAN at all?
Near-real-time monitoring may help your company catch attackers and restore altered data.
Microsoft Warns of Critical ASN.1 Vulnerability; More Doom Unleashed
Auditing can do more than just help you meet a host of new government regulations. The author outlines the significant business benefits from a solid data-auditing program and explains the basic requirements of such a solution. (Part one of a two-part series.)
Companies turn to managed Service providers for help; desktops dominate security budgets as patches average $234 per machine.
Outsourcing efforts yield mixed results. Are CIOs are asking tough questions about the hidden costs?
Is a resurgence of big-ticket capital expenditures for infrastructure ahead?
Big Blue hopes to snare workloads from Unix, Windows as RACF morphs into z/OS Security Server
Readers sound off about recent comments from previous columns
Newest vulerabilities feed on old worm to take aim at Microsoft's Web site
Best practices in keeping the desktop secure