News
News Archive
-
March 27, 2007
27
Mar'07
VoIP's inherited data security problems
VoIP security problems present a challenge for voice and network staff. This article explains how to secure both your call servers and endpoints, and how best to divide this work between voice and data personnel.
-
March 26, 2007
26
Mar'07
What are some of the other options available to help manage unstructured data?
Eliminate unnecessary data from your production storage. This typically involves moving the unnecessary data to a different tier or deleting the data entirely...
-
March 26, 2007
26
Mar'07
What are some of the best practices for managing the growth of unstructured data?
It starts with corporate policies around data management...
-
March 26, 2007
26
Mar'07
What is unstructured data and how is it different from structured data in the enterprise?
What we're really doing is designating our data as structured or unstructured. Let's start with structured data...
-
March 26, 2007
26
Mar'07
Web 2.0: CIOs want it their way
A new study found CIOs want Web 2.0 technology, but they're a little insecure about getting it from emerging specialized vendors.
-
March 26, 2007
26
Mar'07
Metasploit Framework 3.0 released
Brief: Metasploit Framework 3.0 contains 177 exploits, 104 payloads, 17 encoders and 30 auxiliary modules that perform such tasks as host discovery and protocol fuzzing.
-
March 26, 2007
26
Mar'07
How can a company set retention policies with such a glut of unstructured data?
It depends; there are no easy answers to this. There are a number of initiatives that a company should undertake, including disaster recovery, business continuity planning, Sarbanes-Oxley compliance and data security...
-
March 26, 2007
26
Mar'07
How is unstructured data affecting storage administrators and other staff?
There is absolutely an effect. Additional data volume translates into...
-
March 26, 2007
26
Mar'07
Should I use data deduplication to manage unstructured data?
Absolutely; there are two areas where data deduplication, or single-instance storage, can help...
-
March 26, 2007
26
Mar'07
What is the impact of unstructured data on backup and restore and disaster recovery in general?
As data volumes grow, there's a bigger problem meeting recovery time objectives. We depend on our data, and we have set recovery times for our systems that are zero (no downtime) in some cases, though most companies set recovery times from eight to ...
-
March 26, 2007
26
Mar'07
What are some of the biggest challenges with unstructured data?
By far, the volume of data has to be the biggest challenge...
-
March 26, 2007
26
Mar'07
Are there regulatory compliance issues related to unstructured data?
The most important issue is legal discovery. You may not know what you have or how to find it, so it can be very difficult to find the files that may be required by a court of law...
-
March 26, 2007
26
Mar'07
What are some of the hidden costs of managing unstructured data?
-
March 26, 2007
26
Mar'07
IP communications tools boost productivity, sales
IP communications tools have opened up several possibilities for one North American company, giving it presence awareness and unified messaging.
-
March 25, 2007
25
Mar'07
Microsoft investigates Windows Vista Mail flaw
Attackers could exploit a flaw in Windows Vista Mail to compromise PCs by tricking the user into opening a malicious email attachment. Microsoft is investigating.
-
March 25, 2007
25
Mar'07
EMC CEO tips hat on future storage plans
At a media event in Sydney, EMC CEO, Joe Tucci said the company is working on storage tuned to the needs of Web 2.0 apps and also plugged the company's deduplication product.
-
March 25, 2007
25
Mar'07
Basic VoIP network setup
Basic VoIP network setup advice.
-
March 25, 2007
25
Mar'07
Why is VoIP authentication essential?
VoIP authentication advice.
-
March 25, 2007
25
Mar'07
VoIP protocols
VoIP protocols -- the strengths and weaknesses of each.
-
March 22, 2007
22
Mar'07
Midrange storage array purchase considerations
A Buying Guide focusing on specific considerations for midrange disk array systems. Also find a series of specifications to help make on-the-spot product comparisons between v
-
March 22, 2007
22
Mar'07
Flaws haunt protocol tied to national infrastructure
Also: A weakness is found in Windows settings, Microsoft investigates a new Vista flaw, and flaws are addressed in OpenOffice.org and Firefox.
-
March 22, 2007
22
Mar'07
Mozilla releases Firefox fix
One newly-discovered flaw and several glitches introduced in the last update have been fixed with Mozilla's release of Firefox 2.0.0.3 and 1.5.0.11.
-
March 22, 2007
22
Mar'07
Midrange storage array specifications
Product snapshots highlighting key specifications for a cross section of midrange storage array products.
-
March 22, 2007
22
Mar'07
11n will boost speed, prompt upgrades
802.11n's speed will be a welcome boost for end-users, but will create headaches as admins face network upgrades to deal with the demand for bandwidth it unleashes.
-
March 21, 2007
21
Mar'07
Storage Security FAQ audiocast
Don't have time to dig into the FAQ text now? Download the audiocast in MP3 format and listen in the car, at the gym -- wherever you want. You can download the entire presentation or the individual questions that you are most interested in.
-
March 21, 2007
21
Mar'07
Hackers broaden reach of cross-site scripting attacks
An explosion of AJAX-based applications has increased the damage that cross-site scripting (XSS) attacks can inflict on machines. A new tool uses XSS flaws to create a botnet.
-
March 21, 2007
21
Mar'07
VoiceCon Spring: A transition show for the VoIP industry
VoiceCon Spring was all about unified communications. Zeus Kerravala provides highlights of the more interesting points from the show.
-
March 20, 2007
20
Mar'07
NAC panel says technology may not add up
A panel discussing the potential of using network access control (NAC) says the technology may not be worth the price of deploying and maintaining it.
-
March 20, 2007
20
Mar'07
Symantec says fixing licensing portal top priority
Company officials say help is on the way as fallout continues from the merger of Symantec and Veritas ordering systems last November.
-
March 19, 2007
19
Mar'07
Internet complexity, insecurity could stifle innovation, expert says
Security threats are driving vendors to produce software and devices that automatically update and run only proprietary software with no effort from the end user. The result could be less flexibility and innovation, one expert says.
-
March 19, 2007
19
Mar'07
Power over Ethernet power consumption: The hidden costs
Power over Ethernet (PoE) has many advantages in a VoIP migration, but some companies overlook the amount of power needed to run PoE for VoIP and the costs and cooling requirements that come with it.
-
March 18, 2007
18
Mar'07
Symantec: Data thieves thrive on zero-day flaws
According to Symantec's threat report for the second half of 2006, attackers exploited misplaced USB drives and zero-day flaws to steal vast amounts of data. Expect more of the same in 2007.
-
March 18, 2007
18
Mar'07
Hacker techniques use Google to unearth sensitive data
Those who know where to look could use Google to dig up all sorts of sensitive company information, including intellectual property and passwords, one security expert warns.
-
March 18, 2007
18
Mar'07
Cisco stamps on Brocade in Q4, Dell'Oro says
For the second quarter in a row Cisco is gaining SAN switch market share on Brocade, according to the latest report by the Dell'Oro Group. But the numbers are causing a firestorm.
-
March 18, 2007
18
Mar'07
VoIP security worries are plentiful, potent
VoIP creates a new set of security issues for your network, as expert Ed Skoudis explains.
-
March 18, 2007
18
Mar'07
New gigabit standard: How fast is fast enough?
Last June, the 10GBASE-T standard was published promising 10 Gbit operations on copper cabling. This standard was originally targeted toward data centers, but the Ethernet Alliance and IEEE are working on increasing this standard to potentially 40 ...
-
March 15, 2007
15
Mar'07
Cisco buys WebEx for $3.2 billion
Cisco plans to buy WebEx, maker of hosted, on-demand collaboration applications.
-
March 15, 2007
15
Mar'07
Open source IP telephony on hold?
Is open source telephony ready for your business? Read on to learn if it's the real deal.
-
March 15, 2007
15
Mar'07
Carrier MPLS support for VoIP
Achieving QoS for reliable voice transmissions can be the biggest challenge of deploying VoIP. Multi-Protocol Label Switching (MPLS) might be the answer!
-
March 14, 2007
14
Mar'07
Podcast: Security360 - SOA, Web Services Security
ZapThink analyst Jason Bloomberg offers an overview of the security issues unique to SOA environments, while executives from SAP and Oracle discuss how they address SOA security in their software.
-
March 14, 2007
14
Mar'07
Emulex launches storage virtualization appliance
Emulex has packaged a chip from its Aarohi acquisition into an appliance that could be a lower cost hardware platform for storage virtualization software products.
-
March 13, 2007
13
Mar'07
NEC reveals HydraStor grid storage
NEC announces its HydraStor array for secondary storage, touting its grid storage architecture, automated policies for data management and scalable deduplication.
-
March 13, 2007
13
Mar'07
What are some best practices for retaining data in a highly regulated business environment?
Have a good information retention policy. I see a lot of organizations where they retain backups or copies of databases, but they don't know why they're retaining it or for how long...
-
March 12, 2007
12
Mar'07
VoiceCon Spring 2007: More news from the show
Unified communications and VoIP were big topics at VoiceCon Spring 2007. Here are some news highlights from the show.
-
March 11, 2007
11
Mar'07
Wi-Fi interference
In this research report, undertook the challenge to quantify the problem of interference in wireless LANs and defined a methodology for evaluating the effects of interference on WLANs.
-
March 08, 2007
08
Mar'07
Review: eGuardPost a B+ overall
eGuardPost is a well-designed and highly capable product that meets an important need. It has strong security and great forensics capabilities.
-
March 08, 2007
08
Mar'07
Review: Sun Java System Identity Manager 7.0 'impressive'
Hot Pick: Sun Java System Identity Manager 7.0 excels with agentless connectors, scalability and amazing auditing.
-
March 07, 2007
07
Mar'07
Microsoft cancels Patch Tuesday as DST looms
IT administrators who are struggling to apply all their daylight-saving time (DST) patches will get a break from Microsoft next week, as no new security fixes will be released.
-
March 07, 2007
07
Mar'07
Microsoft outlines software-centric VoIP, UC
Microsoft unveils its vision of a software-based VoIP system to enable unified communications.
-
March 07, 2007
07
Mar'07
Symantec acquires automated risk assessment firm
Symantec has acquired Reston, Va.-based 4FrontSecurity, a maker of automated risk analysis and security management tools. An expert says it's the latest sign that the security risk assessment market is heating up.