Business applications
At the heart of enterprise software strategy are the key business applications upon which every organisation relies. From enterprise resource planning (ERP) to customer relationship management (CRM), financial and accounts software to business intelligence (BI), such applications demand high investments and can deliver high returns. We analyse the latest product developments and the news from major suppliers such as Oracle, Microsoft and SAP.
-
E-Zine
09 Nov 2023
Heineken lets the data flow
In this month’s CW EMEA ezine, we find out about Heineken’s mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform, why cyber experts are urging the EU to rethink vulnerability disclosure plans, and how the IT industry is responding to the software developer skills shortfall. Read the issue now. Continue Reading
-
News
20 Oct 2023
Collaboration paramount in KPN’s successful business transformation
KPN tells Oracle CloudWorld 2023 how it transformed when its legacy systems became obstacles to supporting its customers on their digital journeys Continue Reading
-
News
29 Jan 2007
Managed VoIP -- 10 tips for a smooth migration
Migrating to managed VoIP doesn't have to be a headache. Here, Verizon Business offers 10 top tips to ensure you get what you need. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
29 Jan 2007
TJX faces lawsuit over data breach
A class action lawsuit against TJX accuses the retailer of negligence for not doing enough to secure customer data and for keeping quiet about the breach for a month. Continue Reading
By -
News
28 Jan 2007
IBM improves data recovery process for TSM users
Tivoli Storage Manager 5.4, released this week, establishes a disk cache for most recently backed-up files, improving the slow restore times associated with the product. Continue Reading
By- Jo Maitland, TechTarget
-
News
28 Jan 2007
IBM to acquire Softek, looks to pump up services biz
IBM says it intends to use Softek's Transparent Data Migration Facility within its Global Services business. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
28 Jan 2007
Brocade unveils McData integration roadmap
McData's directors and FICON routers will remain separate product lines for now; McData's SAN management software will replace Brocade's Fabric Manager. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
25 Jan 2007
Balancing the cost and benefits of countermeasures
The final tip in our series, "How to assess and mitigate information security threats." Continue Reading
-
News
25 Jan 2007
Malware: The ever-evolving threat
The first tip in our series, "How to assess and mitigate information security threats" Continue Reading
-
News
25 Jan 2007
Network-based attacks
The second tip in our series, "How to assess and mitigate information security threats." Continue Reading
-
News
25 Jan 2007
Information theft and cryptographic attacks
The third tip in our series, "How to assess and mitigate information security threats." Continue Reading
-
News
25 Jan 2007
IBM tool makes online purchases anonymous
A new tool makes online purchases anonymous by using artificial identity information. Experts say enterprises need to adopt the technology before it can become a viable option. Continue Reading
By- Robert Westervelt, TechTarget
-
News
25 Jan 2007
Symantec makes major update to Enterprise Vault
Symantec adds automated data classification and integration with security products in Version 7.0 of its Enterprise Vault archiving tool; EMC reports record earnings for the fourth quarter. Continue Reading
By- SearchStorage.com Staff
-
News
25 Jan 2007
Apple fixes Mac Wi-Fi flaw
The Mac OS X Wi-Fi flaw Apple fixed on 24 Jan was first disclosed as part of the Month of Kernel Bugs in November. Attackers could exploit it to crash the targeted system. Continue Reading
By -
News
24 Jan 2007
iSCSI SANs grow in midmarket, enterprise
Because transporting "SCSI over IP" leverages ubiquitous Ethernet networks, that translates to lower cost, easier maintenance and simpler management, which makes SAN deployment more attractive for SMEs. Continue Reading
-
News
24 Jan 2007
Microsoft investigates new Word zero-day
An unpatched memory-corruption flaw in Microsoft Word is the target of "limited" attacks in the wild, Microsoft confirmed Thursday. Continue Reading
By -
News
24 Jan 2007
TJX data breach info used to make fraudulent purchases
Fraudulent purchases have been reported globally, according to a trade association that represents more than 200 banks in Massachusetts. Continue Reading
By- Robert Westervelt, TechTarget
-
News
23 Jan 2007
Cisco fixes IOS flaws
Attackers could exploit three Cisco IOS flaws to cause a denial of service or launch malicious code. The networking giant has released fixes. Continue Reading
By -
News
23 Jan 2007
Veracode launches on-demand code analysis service
New start up Veracode gives customers the ability to analyse the application binary, and not simply the source code. Continue Reading
-
News
23 Jan 2007
McAfee: Malware all about ID theft
The use of keylogger technology is surging and there's been a 100-fold rise in phishing attacks, according to a new report from McAfee. Continue Reading
By- Bill Brenner, Senior News Writer
-
Feature
18 Jan 2007
Vendors: Cut the hype, truth is what sells
Storage virtualisation technologies have been purchased and implemented successfully for years. The rest of the IT infrastructure must try to catch up and, ultimately, the only thing not virtualised within the datacentre will be the last guy standing. Continue Reading
By- Steve Duplessie, founder and senior analyst for the Enterprise Strategy Group
-
Feature
17 Jan 2007
TJX breach: There's no excuse to skip data encryption
Companies complain that database encryption products are too expensive and difficult to manage, but customer loss and breach notification costs outweigh encryption expenses. Continue Reading
-
News
17 Jan 2007
Companies take IM threats seriously
Wesabe is a brand new money management community. It takes threats to IM as seriously as those targeting email and web applications Continue Reading
By -
Feature
16 Jan 2007
EqualLogic CEO says IPO on the way
EqualLogic's CEO talks about the company's plans to go public, its intent to add 10 GigE to its products and why he thinks not all iSCSI products are created equal. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
16 Jan 2007
Fortify Software to acquire Secure Software
The acquisition of Secure Software will allow Fortify to expand into the requirements and design phases of the software development lifecycle, the company said. Continue Reading
By -
News
15 Jan 2007
Core Security offers powerful testing tool
We highly recommend Core Impact 6.0 to security engineers to verify the vulnerability of their networks. Continue Reading
By- Mike Poor, Contributing Writer
-
News
15 Jan 2007
Apere's IMAG 500 a tough sell
Product review: Apere says many of the issues we encountered are addressed in its next release, but mid-enterprise businesses may not have the tolerance for this product. Continue Reading
By -
News
11 Jan 2007
Oracle emulates Microsoft with advance patch notice
Oracle will patch 52 security flaws across its product line Tuesday, according to its inaugural CPU advance notification bulletin. Continue Reading
By -
News
10 Jan 2007
Sophos acquires Endforce to add NAC
Antivirus vendor Sophos is rounding out its email Web and desktop security software with Endforce's network access control (NAC) software. Continue Reading
By- Robert Westervelt, TechTarget
-
News
09 Jan 2007
Remote flaw in Vista could earn finder $8,000
VeriSign Inc.'s iDefense Labs is offering an $8,000 bounty to any researcher who finds a remotely exploitable flaw in Windows Vista. Continue Reading
-
News
09 Jan 2007
Network configuration management key to VoIP success
While companies spend millions on upgrading infrastructure for VoIP, little attention is given to solving the largest source of downtime – configuration-related outages due to human error. Continue Reading
By- Zeus Kerravala, senior vice president, Yankee Group
-
News
08 Jan 2007
How far apart can SAN locations be?
Storage locations can potentially be very far apart, separated by thousands of miles, even around the globe. The real consideration in selecting distance is that of latency... Continue Reading
-
News
08 Jan 2007
What has been the impact of storage virtualization on SAN deployments?
I really have not seen storage virtualization driving storage area network (SAN) deployment... Continue Reading
-
Feature
08 Jan 2007
Inside MSRC: Microsoft updates WSUSSCAN issue
Christopher Budd of the Microsoft Security Response Center is urging customers to deploy the latest versions of the Systems Management Server Inventory Tool for Microsoft Updates or Microsoft Baseline Security Analyzer to receive all the current software updates. Continue Reading
-
News
08 Jan 2007
Critical fixes for Excel, Outlook and Windows
Microsoft starts the year with security updates for Excel, Outlook and Windows. Three of the fixes are rated critical. Continue Reading
By -
News
08 Jan 2007
Convergence, interoperability key in disaster planning
Convergence and interoperability are major factors in ensuring communications continuity in a disaster. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
08 Jan 2007
Attackers hide malicious code using new method
Attackers have designed a new way to thwart virus signatures from antivirus vendors, says a new report. Continue Reading
By- Robert Westervelt, TechTarget
-
News
08 Jan 2007
What guidelines should our listeners use for oversubscribing or under subscribing?
Oversubscription has long been a contentious topic... Continue Reading
-
News
08 Jan 2007
What are some best practices when it comes to designing a SAN?
First, design for growth. Next, design for maintenance, which may include... Continue Reading
-
News
07 Jan 2007
Bug Briefs: OpenOffice vulnerable to attack
Other flaws were reported in Apple QuickTime, Mac OS X, Adobe Flash Player, VideoLAN VLC, the Opera Web browser, and Cisco Access Control Server. Continue Reading
By- SearchSecurity.com Staff
-
News
07 Jan 2007
Microsoft nixes four patch bulletins
Eight security updates were originally scheduled for Patch Tuesday , but Microsoft has decided to hold back on half of them. Continue Reading
By -
Feature
04 Jan 2007
Why don't we have clustered FC block storage?
Is it odd that the industry has made such serious strides toward incorporating clustering concepts in both file-based storage and IP -based storage, but not Fibre Channel storage? Continue Reading
-
News
03 Jan 2007
Cisco bolsters security with IronPort buy
Cisco Systems agreed Thursday to buy Internet gateway security vendor IronPort Systems Inc. for $830 million. Continue Reading
By- Robert Westervelt, TechTarget
-
Feature
03 Jan 2007
Top Web security tips of 2006
Check out the top five Web security tips of 2006 to get advice on securing Internet Explorer, ISA Server and Radius and a set of tools designed to secure the Web browsing experience. Continue Reading
-
News
03 Jan 2007
Cisco software vulnerable to attack
Cisco's Clean Access software and Clean Access Manager are at risk to attack. A malicious user can access a database snapshot and download it without authentication. Continue Reading
By- Robert Westervelt, TechTarget
-
Feature
03 Jan 2007
Adobe Reader flaws spook security experts
Security experts sound the alarm over Adobe Reader flaws that could be exploited for cross-site scripting attacks and other mayhem. Continue Reading
-
News
02 Jan 2007
Security pros grumble over spam increase
Spim and spam from unexpected sources is challenging enterprises in 2007. Some enterprises are taking action. Continue Reading
By- Edmund X. DeJesus, Contributor
-
Feature
01 Jan 2007
Top Windows server hardening tips of 2006
Check out the top Windows server hardening tips of 2006 for helpful advice on domain controller penetration testing, security tips for the Windows Server 2003 OS and more. Continue Reading
-
Feature
01 Jan 2007
Security pros glean insight from '06
Corporate acquisitions, an abundance of spam, and the White House's take on cybersecurity mark 2006. Continue Reading
-
Feature
01 Jan 2007
Storage Outlook '07: Seeking better backups and archives
Tom Becchetti, senior infrastructure engineer for a major national financial services company, says compliance, backup and archiving will be top priorities in 2007. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
26 Dec 2006
Looking back at information security in 2006
In this special edition of Security Wire Weekly, senior news writer Bill Brenner reviews his top interviews of 2006. Continue Reading
By- SearchSecurity.com Staff
-
Feature
20 Dec 2006
Top client security tips of 2006
A network user without the proper know-how is a ticking time bomb when it comes to security. Check out our top five client hardening tips of 2006 to get a head start on protecting yourself from potentially dangerous users. Continue Reading
-
News
20 Dec 2006
Top 10 storage acquisitions of 2006
Industry consolidation was fast and furious this year. We rank the deals by quality, not quantity. Continue Reading
By- Jo Maitland, News Director and Beth Pariseau, News Writer
-
News
19 Dec 2006
Microsoft releases Vista APIs to security vendors
Microsoft released a draft set of programming interfaces allowing security vendors to develop software using the Windows kernel on 64-bit systems. Continue Reading
By- Robert Westervelt, TechTarget
-
News
19 Dec 2006
Mozilla fixes multiple Firefox flaws
Digital miscreants could exploit flaws in Mozilla's popular Firefox browser to bypass security programs, access sensitive information and conduct cross-site scripting attacks. Continue Reading
By -
Feature
18 Dec 2006
Top network security tips of 2006
The top Windows networking security tips of 2006 cover a range of topics, including network isolation, open source Windows security tools, VPN security and more. Continue Reading
-
News
18 Dec 2006
VoIP hacking exposed in new book
VoIP hacking is a reality, and in a new book, two VoIP security experts outline the tools and tricks to avoid a system-crushing hack. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
17 Dec 2006
Criminals find safety in cyberspace
A new report from McAfee shows how criminals are enjoying a sense of safety and anonymity in cyberspace that they never had on the street. And they're making more money. Continue Reading
By -
Feature
17 Dec 2006
Enterprises are open to Asterisk
Organisations have become so comfortable with VoIP and standards that open-source technologies like Asterisk are being given serious consideration over big iron PBX platforms. Learn all about Asterisk here. Continue Reading
By- Leigha Cardwell-Bloss
-
Feature
17 Dec 2006
Top storage tips 2006
What's on the minds of storage techies. What's hot, what's not, what works, what doesn't work. These expert tips cover the storage issues that take top honours when it comes to disaster recovery, NAS, SAN, backup and storage management. Continue Reading
-
Feature
14 Dec 2006
Review: Deep Security is a solid IPS
Third Brigade's Deep Security is a well-designed, effective product with strong configuration and policy control capabilities. Continue Reading
By- Steven Weil, Point B
-
Feature
13 Dec 2006
Microsoft Vista could improve Internet security
Two new Microsoft Vista features -- Kernel Patch Protection and User Account Control -- could prove especially useful in preventing serious malware infections. Continue Reading
-
Feature
13 Dec 2006
Review: Lancope StealthWatch 5.5 offers more than IDS
Hot Pick: StealthWatch goes far beyond traditional intrusion detection, with powerful network-monitoring features. The optional IDentity-1000 is an essential addition. Continue Reading
By- Sandra Kay Miller, Contributing Writer
-
News
13 Dec 2006
Review: Sky's the limit with Skybox View 3.0
Hot Pick: Skybox View 3.0 offers a unique and flexible approach for assessing and managing specific threats and overall risk to your digital assets. Continue Reading
By- Brent Huston, Contributing Writer
-
Feature
13 Dec 2006
Hot technologies for 2007
"Storage" magazine's editors reviewed technology developments, product introductions and storage standards to come up with this short list of must-have technologies for 2007. Continue Reading
-
News
13 Dec 2006
Third zero-day found in Microsoft Word
For the third time in a week, a zero-day flaw has been found in Microsoft Word. Users should be cautious when opening attachments from unknown sources. Continue Reading
By -
News
13 Dec 2006
Eclipse adoption rate on the increase
The adoption rate of the open source Eclipse integrated development environment has more than doubled in Europe, the Middle East and Africa, industry analysts have revealed. Continue Reading
By -
News
12 Dec 2006
Symantec issues NetBackup security alert
Symantec issues an alert and patch to vulnerabilities in NetBackup 6.0, 5.1 and 5.0. Continue Reading
By- Jo Maitland, TechTarget
-
News
11 Dec 2006
Microsoft fixes two zero-day flaws
The December security update from Microsoft includes patches for zero-day flaws in Visual Studio and Windows Media Player, but two zero-day flaws in Word remain unfixed. Continue Reading
By -
News
11 Dec 2006
IT pros look for ways to lock down IM
Special Report: To control growing IM threats, administrators are trying to limit which programs can be used or ban the technology altogether. But that's not always possible. Continue Reading
By -
Feature
11 Dec 2006
Inside MSRC: Visual Studio flaw, tool extensions explained
Christopher Budd of the Microsoft Security Response Center sheds detail about a flaw in Visual Studio 2005 and explains that support for Software Update Services 1.0 will be extended. Continue Reading
-
Feature
11 Dec 2006
Infrastructure security: Remote access DMZ
An excerpt from Chapter 7: Infrastructure security from "How to Cheat at Managing Information Security," by Mark Osborne. Continue Reading
-
News
11 Dec 2006
Vendors to crank up SaaS offerings to SMBs next year
SMBs will outpace enterprises when it comes to IT spending in 2007 -- and vendors will delve deeper into SaaS to reach them. Continue Reading
By- Shamus McGillicuddy, Enterprise Management Associates
-
News
11 Dec 2006
SIP desktop phone blends functionality, style
VoIP desktop phones are no longer the clunky hunks of plastic that take up space on your desk. Siemens yesterday launched a new family of SIP phones that are as slick as they are functional. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
10 Dec 2006
Zantaz buys data classification partner Singlecast
Email archiving player Zantaz has purchased data classification startup Singlecast, which can categorise and apply policies to data before an email takes up storage space. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
10 Dec 2006
Microsoft suffers third zero-day in a week
A second zero-day flaw in Word has been uncovered, Microsoft said Sunday. It's the software giant's third zero-day in a week. Continue Reading
By -
News
10 Dec 2006
Storage Decisions in the wild, wild west
Dedupe, iSCSI, backup, virtualisation and cowboys in Stetson hats -- Storage Decisions Las Vegas 2006 had it all. Continue Reading
By- SearchStorage.com Staff
-
Feature
07 Dec 2006
Zero-day tracker a hit, but IT shops need better strategy
This week in Security Blog Log: Reaction to eEye's new zero-day tracker is positive, but some experts say it won't help unless IT shops have a layered defense to start with. Continue Reading
-
News
07 Dec 2006
Dell, Microsoft tout joint NAS product
The new NX1950 product is vastly more expensive than its counterparts from HP and NetApp, but it scales higher, supports clusters and has redundant controllers. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
06 Dec 2006
Microsoft to fix Visual Studio, Windows flaws
Microsoft plans to release five security updates to address vulnerabilities in Windows and a flaw in Visual Studio as part of its monthly security bulletin release cycle. Continue Reading
By -
News
06 Dec 2006
Zero-day flaw found in Windows Media Player
Attackers could exploit a new zero-day flaw in Windows Media Player to cause a denial of service or launch malicious code. The threat is Microsoft's second zero-day flaw in a week. Continue Reading
By -
News
06 Dec 2006
MP3 search site pushes spyware, watchdogs say
A Web site that gives users the ability to search for MP3s contains programs that behave like spyware, according to the Center for Democracy and Technology and StopBadware.org. Continue Reading
By -
News
04 Dec 2006
IBM to acquire compliance software firm
IBM plans to acquire Consul Risk Management Inc., a Delft, Netherlands-based firm whose software tracks non-compliant behavior of employees. Continue Reading
By- Robert Westervelt, TechTarget
-
News
03 Dec 2006
Security Bytes: Phishing worm spreads through MySpace
Round up of security news Continue Reading
By- SearchSecurity.com Staff
-
News
30 Nov 2006
Terrorists may target financial sites
The U.S. government is warning of an al-Qaida call for a cyberattack against online stock trading and banking Web sites Continue Reading
By- SearchSecurity.com Staff
-
News
30 Nov 2006
Symantec blames piracy for Veritas licensing snafu
Weekly compilation of storage news: Symantec says that software counterfeiting is throwing a wrench in tech support ; FRCP rules take effect. Continue Reading
By- SearchStorage.com Editors
-
News
30 Nov 2006
Oracle responds to security critics
Security Blog Log: Oracle takes on researchers who have criticised its security procedures in recent weeks. Meanwhile, Symantec warns of new zombie malware. Continue Reading
-
News
29 Nov 2006
Video conferencing brings desktop VoIP, app sharing
Voice, video and Web conferencing vendor Genesys adds desktop VoIP and enhanced application sharing to its collaboration lineup. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
29 Nov 2006
Multiple flaws in Adobe Reader, Acrobat
Multiple flaws in Adobe Reader and Acrobat could allow attackers to execute malicious commands on victims' computers. Continue Reading
By -
News
28 Nov 2006
Symantec fixes NetBackup Puredisk flaw
An unauthorised user could launch malicious code by exploiting a flaw in Symantec's Veritas NetBackup PureDisk product. But a fix is available. Continue Reading
By -
Feature
27 Nov 2006
Active Directory security school: Set up and configuration
An Active Directory security lesson. Continue Reading
-
Feature
26 Nov 2006
Recordless email: magical or menacing?
A new startup promises recordless email. Is this a stroke of genius that will reward the company with billions of Internet bucks, or is it the end of the world as we know it? Continue Reading
-
News
22 Nov 2006
Zango defying FTC agreement, researchers say
This week in Security Blog Log: Two researchers accuse Zango of unsavory adware tactics, despite the company's pledge to clean up its act. Continue Reading
-
News
21 Nov 2006
New Mac OS X flaw exposed
A Mac OS X flaw was exposed as part of the Month of Kernel Bugs. Also, a new Web site vows to follow the lead of researchers LMH and H.D. Moore with a week of Oracle zero-days. Continue Reading
By -
News
21 Nov 2006
BakBone brushes up replication software
BakBone's NetVault Replicator version 5.0 includes automatic configuration of replication for remote sites, a capacity planning tool and a higher performance data movement engine. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
21 Nov 2006
Telecom overspending -- thwart it!
Research has found that telecom overspending is out of control, but a new batch of software is out there to help enterprises get a handle on their telecom billing. Continue Reading
By- Andrew R. Hickey, Senior News Writer
-
News
13 Nov 2006
Trojan poses as Adobe software update
The Trojan keylogger comes in an email that asks users to download the latest version of Adobe Reader. It then tries to steal the user's confidential information. Continue Reading
By- SearchSecurity.com Staff
-
Feature
09 Nov 2006
Security Blog Log: Sailing a sea of spam
This week, bloggers struggle to purge their bloated inboxes. Their experiences lend weight to recent studies showing a breathtaking spike in spam. Continue Reading
-
News
08 Nov 2006
Storage virtualization acquisitions need careful consideration
Storage virtualization alleviates traditional storage growth problems by implementing a layer of abstraction between applications and physical storage, allowing storage to be combined and treated as a ubiquitous resource, regardless of location. This buying guide helps you understand the most important considerations involved in storage virtualization product selection, identifies specific points of interest for software, hardware and VSAN product categories, and presents a series of basic product specifications that will start you pick the best product for your organization. Continue Reading
- News 07 Nov 2006
-
News
07 Nov 2006
Mozilla fixes Firefox flaws
Attackers could exploit multiple flaws in Firefox, SeaMonkey and Thunderbird to crash machines, bypass security restrictions and launch malicious code. Continue Reading
By -
News
06 Nov 2006
How to manage encryption keys
Encryption is an effective way to secure data, but the encryption keys used must be carefully managed to ensure data remains protected and accessible when needed. Continue Reading