News
News Archive
-
May 31, 2007
31
May'07
Cisco, Nortel frontrunners in Avaya acquisition rumors
Cisco and Nortel are said to be amongst those circling the still-live body of VoIP vendor Avaya, but analysts disagree on which, and why.
-
May 31, 2007
31
May'07
HDS CEO quits for HP storage biz
Dave Roberson, CEO of Hitachi Data Systems since 2006, has jumped ship to HP to run the server giant's storage business.
-
May 30, 2007
30
May'07
Brocade gets into the HBA business
Experts say the move, based on a partnership with LSI, could lower HBA pricing across the board and be the first step toward a Brocade-developed storage virtualization product.
-
May 29, 2007
29
May'07
SAN School: Table of contents
What is a storage area network? What are the benefits and pitfalls of installation? How can a SAN fit into your organization? These questions and more are answered SAN School.
-
May 29, 2007
29
May'07
The wireless future offers plenty of voice possibilities
Farpoint Group's Craig Mathias surveys the future of wireless networks and their ability to carry voice traffic.
-
May 29, 2007
29
May'07
Bridging VoIP islands
WAN optimisation makes it possible to connect campus VoIP connections
-
May 25, 2007
25
May'07
VoIP advice from the trenches
ITKE, or ITKnowledge Exchange, is simply a cool (and quick) way to get a response to your VoIP-related questions.
-
May 24, 2007
24
May'07
Data retrieval strategies: Retrieving email and database archives overview
This overview focuses on the considerations involved in email and database archives with an emphasis on retention and search to meet legal discovery requirements.
-
May 24, 2007
24
May'07
Microsoft NAP-TNC compatibility won't speed adoption, users say
Users hail the new compatibility of Microsoft NAP and the Trusted Computing Group's TNC architecture. But they say it won't speed up their adoption timetables.
-
May 24, 2007
24
May'07
McAfee launches IPS for 10g networks, but is IT ready?
McAfee unveiled a new IPS offering for 10-gigabit Ethernet networks and announced the upgrade and integration of several other products. One analyst offers a mixed assessment.
-
May 24, 2007
24
May'07
Microsoft fixes Office 2007 patch issues, releases MOICE
The Microsoft Security Response Center acknowledged that some of the company's May 8 security updates didn't make it to machines running Office 2007 on Windows Vista.
-
May 24, 2007
24
May'07
Symantec, Huawei form joint storage, security company
Symantec has formed a joint venture with storage and networking hardware company Huawei and indicated jointly developed products are coming to the US
-
May 24, 2007
24
May'07
Sourcefire, Nmap deal to open vulnerability scanning
Sourcefire and Insecure.org have inked an agreement to develop open source vulnerability scanning tools based on Insecure's Nmap scripting engine.
-
May 24, 2007
24
May'07
IETF approves new weapon to fight spam, phish
DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks.
-
May 24, 2007
24
May'07
Microsoft investigates new Office zero-day flaw
Attackers could exploit a newly-discovered zero-day flaw in Office 2000 to run malicious code on targeted machines, Symantec warned.
-
May 24, 2007
24
May'07
Cisco, EMC partner on SAN encryption
Cisco will ship encryption in switches later this year integrated with EMC's RSA key management software. Users are curious but cautious about its impact on other services.
-
May 22, 2007
22
May'07
Mitel acquires Inter-Tel, signaling more consolidation to come
Mitel acquired Inter-Tel last week, signaling a trend toward vendor consolidation in the VoIP market and creating stronger options for SMBs.
-
May 22, 2007
22
May'07
Microsoft unveils unified communications devices
Microsoft unveils unified communications devices.
-
May 22, 2007
22
May'07
Selling network certification: How to talk up your credentials to current and future employers
Network certification has its benefits, but certification alone no longer guarantees employment. In this tip, learn how to justify your credentials' value.
-
May 21, 2007
21
May'07
Cisco warns of new IOS flaws
The new flaws are classified as "low," but if exploited they could result in a sustained DoS condition, Cisco said.
-
May 21, 2007
21
May'07
EMC users push for better power consumption
EMC announces a 1.8 PB VTL, deduplication for VMware and bare-metal restore for servers as users caution the company to stay focused on everyday problems, such as power consumption.
-
May 21, 2007
21
May'07
Mobile instant messaging enhances company's business processes
A mobile IM service acquired by a hosted VoIP provider encourages more companies to enhance their business processes.
-
May 21, 2007
21
May'07
Microsoft, TCG partner on network access control; Cisco takes own route
Microsoft and the Trusted Computing Group (TCG) have joined forces to create better interoperability between network access control solutions with the announcement of a new specification which ensures that Microsoft's Network Access Protection (NAP)...
-
May 20, 2007
20
May'07
Learn NetStar's secret to success
NetStar is a systems integrator and managed service provider and also a survivor of the dot.com crash. The company secured venture capital funding way back at the turn of the century and has put the money to good use, eschewing the ebony ...
-
May 17, 2007
17
May'07
VoIP security fundamentals
VoIP security is a challenge for IT staff because IP telephony brings with it not only the security problems of data networks but also new threats specific to VoIP. In this fundamentals guide, learn about network security threats and emerging IP ...
-
May 16, 2007
16
May'07
Screencast: How to configure a UTM device
In this exclusive screencast, expert David Strom demonstrates the configuration options available in SonicWall's unified threat management product.
-
May 16, 2007
16
May'07
When signature based antivirus isn't enough
Zero-day exploits, targeted attacks and increasing demands for endpoint application controls are driving the rapid metamorphosis from signature-based antivirus and antispyware to HIPS-based integrated products.
-
May 11, 2007
11
May'07
Choosing WAN providers: Key questions to ask
When evaluating carrier services for the WAN, it's imperative to ask some key questions regarding customer service, service-level agreements, global coverage, management and monitoring capabilities, and underlying technologies. Make sure these ...
-
May 11, 2007
11
May'07
Cisco fixes fresh flaws in IOS
Attackers could exploit two flaws in Cisco's IOS to cause a denial of service or tamper with data in a device file system.
-
May 11, 2007
11
May'07
VoIP, unified communications adoption continue to rise
VoIP and unified communications adoption continue to rise steadily in the enterprise, according to Infonetics Research's latest report.
-
May 10, 2007
10
May'07
EMC buys Indigo Stone for bare-metal restore
EMC has been hush-hush about adding Indigo Stone, a bare-metal restore software company, to its stack of acquisitions.
-
May 09, 2007
09
May'07
Symantec fixes flaws in Norton, pcAnywhere
Attackers could exploit flaws in Symantec's Norton AntiVirus and pcAnywhere to launch malicious code or compromise a user's session credentials.
-
May 08, 2007
08
May'07
Companies plug FTP holes with secure FTP servers
Some companies are investing in secure FTP suites to give employees and business partners the ability to transfer large files such as large documents, audio, video and photos.
-
May 08, 2007
08
May'07
What top five subjects does the CCNA test focus on?
Know what subjects are tested most heavily on in the CCNA exam. Use this top five list from Cisco certifications expert Dave Minutella in this response.
-
May 08, 2007
08
May'07
ISCSI TCP/IP TOE card specifications
One means of improving iSCSI traffic performance is to include TOE (TCI/IP Offload Engine) capability on the Ethernet card itself. An iSCSI TOE allows the network adapter to process iSCSI traffic (often all Ethernet LAN traffic) locally -- relieving...
-
May 07, 2007
07
May'07
Is RAID in general an obsolete technology today?
This is a technology that is so commonly used, so transparent, that we really don't even think about it...
-
May 07, 2007
07
May'07
What are the most important new disk drive technologies?
The first 1 terabyte hard disk drives have appeared. What will be the impact of hard disk drive technologies such as perpendicular recording, 2.5-inch high-performance drives, secure erase, encryption and hybrid technology drives?
-
May 06, 2007
06
May'07
Intransa launches 10 GigE IP SAN
Intransa is now shipping a standalone 10 GigE system, but it may take a while for applications and operating systems to be ready for the big pipe.
-
May 03, 2007
03
May'07
Quiz: Preventing data leaks
A six-question multiple-choice quiz to test your understanding of the content presented by expert Richard Bejtlich in this lesson of SearchSecurity.com's Data Protection Security School.
-
May 03, 2007
03
May'07
Quiz: Enterprise strategies for protecting data at rest
A five-question multiple-choice quiz to test your understanding of the e-discovery content presented by expert Perry Carpenter in this lesson of SearchSecurity.com's Data Protection Security School.
-
May 03, 2007
03
May'07
Quiz: Demystifying data encryption
A five-question multiple-choice quiz to test your understanding of the data encryption content presented by expert Tom Bowers in this lesson of SearchSecurity.com's Data Protection Security School.
-
May 03, 2007
03
May'07
Network waste to reach $100 billion
Network overspending will cost enterprises more than $100 billion over the next five years, according to recent predictions by Gartner Inc.
-
May 03, 2007
03
May'07
Microsoft users sticking with third-party security vendors
IT pros are pleased with Microsoft's security advances, including those found in Forefront. But don't expect them to drop their third-party security vendors.
-
May 02, 2007
02
May'07
Microsoft to release DNS patch Tuesday
In addition to a fix for the DNS Server Service flaw, Microsoft plans to patch critical flaws in Windows, Office, Exchange, CAPICOM and BizTalk.
-
May 01, 2007
01
May'07
IM slang glossary
-
April 29, 2007
29
Apr'07
WEP: Wireless security's broken skeleton in the closet
WEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it.
-
April 26, 2007
26
Apr'07
New image spam sneaks into inboxes
Researchers at Secure Computing Corp. have discovered a new form of image spam that is sneaking into corporate systems and clogging inboxes.
-
April 26, 2007
26
Apr'07
Websense to acquire SurfControl
Websense says its planned $400 million acquisition of SurfControl will allow it to better compete in the global security market.
-
April 25, 2007
25
Apr'07
NetApp VP says storage virtualization overrated
NetApp's vice president of emerging products, Jay Kidd, discusses storage virtualization, competition with Isilon and NetApp's current identity crisis.
-
April 24, 2007
24
Apr'07
Scaling storage networks demands careful consideration
In the Fibre Channel world, scaling often means adding more and faster switch ports to extend the fabric's bandwidth and connectivity. But IP storage (mainly iSCSI) is a growing area of SAN expansion, using ubiquitous Ethernet network technology to ...