Business applications
At the heart of enterprise software strategy are the key business applications upon which every organisation relies. From enterprise resource planning (ERP) to customer relationship management (CRM), financial and accounts software to business intelligence (BI), such applications demand high investments and can deliver high returns. We analyse the latest product developments and the news from major suppliers such as Oracle, Microsoft and SAP.
-
E-Zine
09 Nov 2023
Heineken lets the data flow
In this month’s CW EMEA ezine, we find out about Heineken’s mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform, why cyber experts are urging the EU to rethink vulnerability disclosure plans, and how the IT industry is responding to the software developer skills shortfall. Read the issue now. Continue Reading
-
News
20 Oct 2023
Collaboration paramount in KPN’s successful business transformation
KPN tells Oracle CloudWorld 2023 how it transformed when its legacy systems became obstacles to supporting its customers on their digital journeys Continue Reading
-
News
09 Oct 2006
Banking on the future
As the banking landscape changes and global competition takes hold, IT offers banks a way of differentiating themselves from the competition, so how do they balance innovation and imitation in this tough market sector? Continue Reading
-
News
04 Oct 2006
Tiered storage becoming tried and true
Tiered storage matches the value of data with the performance (and expense) of storage. Ideally, tiered storage can save money, while easing the access demands to any single storage tier. While tiered storage has clearly brought storage costs and performance into focus, it has yet to reach its full potential in the enterprise. Continue Reading
-
Feature
02 Oct 2006
ZERT rekindles third-party patching debate
This week in Security Blog Log: IT security pros express more reservations about third-party patching, including the CEO of a company that released one a few months ago. Continue Reading
-
Feature
27 Sep 2006
On privacy laws, every state is one of confusion
It's getting increasingly difficult for US firms to comply with regulations . David A. Meunier feels that it's time to develop safeguards and processes for this ever-changing regulatory environment. Continue Reading
By- David A. Meunier
-
Feature
27 Sep 2006
Top 5 free Windows security downloads
The place where you can find free tools that help you crack passwords, remove troublesome spyware and enhance network security. Check out our five most popular tools and find out what you've been missing. Continue Reading
-
News
26 Sep 2006
Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services'
Voice over IP Fundamentals: Chapter 9, 'Billing and Mediation Services' Continue Reading
-
News
26 Sep 2006
Stration worm targets Windows machines
The worm uses several fake email messages, including one claiming to be a security update. Users are advised to avoid unsolicited email attachments. Continue Reading
By -
News
24 Sep 2006
Hijacked consumer machines target the enterprise
Attackers continue to strike gold by targeting consumers who lack the security savvy to address desktop application flaws, according to Symantec Corp. Enterprises ultimately pay the price. Continue Reading
By -
Feature
24 Sep 2006
NetApp operations chief talks growth
Tom Georgens, executive vice president and general manager at NetApp -- also rumoured to be in the running as next CEO -- discusses what's driving its growth. Continue Reading
By- Jo Maitland, TechTarget
-
News
14 Sep 2006
Mozilla fixes several Firefox flaws
Several flaws could be used for man-in-the-middle, spoofing and cross-site scripting attacks. Mozilla has released Firefox 1.5.0.7 to address the problems. Continue Reading
By -
News
14 Sep 2006
Secure network perimeter to result from Symantec-Juniper deal
Juniper and Symantec announced a deal to integrate Symantec's client security software with Juniper's security hardware. The result will allow endpoint compliance and access control platforms to secure the enterprise perimeter. Continue Reading
By- Amanda Mitchell, News Editor
-
News
14 Sep 2006
Three ways to create clustered storage, page 3
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment. Continue Reading
-
News
14 Sep 2006
Three ways to create clustered storage
Clustered storage systems run on storage servers, NAS gateways and hosts. Here's how to determine which clustered file-system architecture is best for your needs and storage environment. Continue Reading
-
News
12 Sep 2006
Dell and EMC: Five more years
Dell leans on EMC for support in the face of an SEC investigation and possible delisting from NASDAQ. Continue Reading
By- Alex Barrett, News Director, Datacenter Media Group
-
News
12 Sep 2006
Big security fixes for QuickTime, Flash Player
Apple and Adobe warned that attackers could exploit multiple flaws in QuickTime and Flash Player to run malicious code on targeted machines. Continue Reading
By -
News
11 Sep 2006
Security Bytes: Hackers target the Terminator
In other news, Symantec upgrades its Norton product line and the Anti-Phishing Working Group says phishing activity soared this summer. Continue Reading
By- SearchSecurity.com Staff
-
News
11 Sep 2006
Data storage compliance's impact on storage product choices
Data storage compliance is having a tremendous impact on the storage organization, as well as the management practices employed to retain, search, certify and destroy data. It's not just regulations like SOX or HIPAA that influence storage -- there are well over 10,000 regulations that affect data storage, backup and protection across a range of industries. But companies are often left alone in their quest to identify the regulations that relate to them, identify what data should be saved and implement storage to meet those regulations. This article covers the essential goals of data storage compliance, examines implementation considerations and obstacles and reviews the impact of compliance on storage. Continue Reading
-
News
11 Sep 2006
Storage IPOs bode well for competition
Analysts say new public players could breathe competitive life into the market, but it all hinges on how well execs can balance the needs of users and shareholders. Continue Reading
By- Beth Pariseau, Senior News Writer
- News 06 Sep 2006
-
News
06 Sep 2006
Security Bytes: New flaw in Cisco IOS
Security news including Cisco, Mozilla hires a former Microsoft strategist to bolster security, a new "pump-and-dump" stock spam campaign is discovered and TippingPoint lists info on new flaws. Continue Reading
By- SearchSecurity.com Staff
-
News
06 Sep 2006
VoIP startup untethers would-be mobile workers from wireline office phones
VoIP startup DiVitas Networks has voice-over-WiFi-to-cellular technology in the works that gives endusers access to enterprise apps and puts dual-mode handset management in the hands of network administrators. Continue Reading
By- Amanda Mitchell, News Editor
-
Feature
06 Sep 2006
Security Blog Log: Word doc scam evades spam filters
Also this week: A researcher gets a harsh reward after flagging a University of Southern California Web site flaw, and more blogs are keeping an eye on the latest security breaches. Continue Reading
-
News
05 Sep 2006
Proofpoint delivers strong messaging security
Proofpoint Messaging Security Gateway is a highly recommended, affordable solution for big enterprises that need protection from email-based attacks. Continue Reading
By- Phoram Mehta, Contributing Writer
-
News
04 Sep 2006
Revamped Cisco WAFS worth the wait, users say
Months late, Cisco has finally released a combined Wan optimisation and WAFS product, while startups like Riverbed have been snapping up the customers. But some Cisco beta testers say it has been worth the wait. Continue Reading
By- Beth Pariseau, Senior News Writer
-
Feature
04 Sep 2006
Protecting wireless networks: Step 3
Security testing expert Kevin Beaver covers the tools and techniques needed to find and exploit insecure wireless networks. Continue Reading
-
Feature
04 Sep 2006
Protecting wireless networks: Step 2
Security testing expert Kevin Beaver covers the tools and techniques you'll need to find and exploit insecure wireless networks. Continue Reading
-
Feature
04 Sep 2006
Wireless network security testing
Attack your own wireless networks to find vulnerabilities before malicious hackers do. Continue Reading
-
News
31 Aug 2006
Attacks against MS06-040 on the rise
Six pieces of malware are now going after the Windows Server Service flaw outlined in MS06-040, and a spike in attacks has led Symantec to raise its ThreatCon to Level 2. Continue Reading
By -
Feature
31 Aug 2006
Identity and Access Management Security School
This Security School explores critical topics related to helping security practitioners establish and maintain an effective identity and access management plan. Continue Reading
-
News
30 Aug 2006
Symantec CIO vies with virtualization, device policy
Symantec CIO David Thompson says virtualization is a big part of the security giant's future and it has developed a policy to mitigate virtualization security risks. Continue Reading
-
News
30 Aug 2006
Survey: Data breaches difficult to spot, prevent
IT pros worry that false positives and a lack of resources are preventing them from blocking data breaches Continue Reading
By -
News
30 Aug 2006
Malware database access sparks debate
Should an emerging database of more than 300,000 malware samples remain a walled community for trusted users, or is open access the best way to fight off digital desperados? Continue Reading
By -
News
29 Aug 2006
AT&T breach affects 19,000 customers
Online outlaws hacked into an AT&T computer system and stole credit card data on thousands of customers. AT&T has offered to pay for credit monitoring services for those affected. Continue Reading
By -
News
28 Aug 2006
Microsoft probes alleged Internet Explorer flaw
A research group claims attackers could launch malicious code using a flaw in the way Internet Explorer instantiates certain COM objects' ActiveX controls. Continue Reading
By -
News
28 Aug 2006
Riverbed update offers users more bandwidth, better reporting
Riverbed announced a package of hardware and software updates, which some customers say they've been waiting for. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
28 Aug 2006
Virtualisation eases patch management pain
IT managers are learning that using desktop virtualisation software to patch their enterprise desktops has the potential to save time, money and energy. Continue Reading
By- Eileen Kennedy, News Writer
-
News
27 Aug 2006
3PAR adds midrange array for secondary sites
3PAR has introduced a smaller version of its InServ Storage Server, which it describes as a product-line extension into its existing customer base. Continue Reading
By- Jo Maitland, TechTarget
-
News
27 Aug 2006
Third-party patching: Prudent or perilous?
Security patches issued by third parties have become more prevalent in recent months, and while some security pros endorse them, others say they're more trouble than they're worth. Continue Reading
By -
News
24 Aug 2006
Are tape backups a thing of the past when it comes to disaster recovery?
I guess we have to look at disaster recovery, when it comes to tapes, in order of priorities. So, if we're talking about your most critical applications nowadays -- your most critical data -- tape backup is actually losing favor to disk backup or data replication. Continue Reading
-
News
24 Aug 2006
How do I identify what data to replicate and what data to simply backup?
It goes back again to the value of the data to your organization -- or the impact of losing access to this data. Typically, from a business continuity perspective, the best way to establish this is through what we call a "business impact analysis," which really measures the impact of an outage on your revenue stream or your organization from a public perception point of view. Continue Reading
-
News
24 Aug 2006
What is the most important aspect of data protection when it comes to DR?
You could answer that with one word really, and I would have to say "testing." Just "testing." Whatever you do when you're protecting data, whether it's a backup, whether it's replication, whatever it is, make sure that you test what you put in place. Just because the vendor's glossy ad said that theproduct allows you to restore "virtually in seconds," I wouldn't necessarily take their word for it. Continue Reading
-
News
24 Aug 2006
Weekly compilation of storage news
Symantec peddles enterprise vault toolT and the new features developed because of a recent update to the US Federal Rules of Civil Procedure. Continue Reading
By- SearchStorage.com Staff
-
News
24 Aug 2006
Security Blog Log: Opinions abound on IBM/ISS deal
Bloggers ponder what IBM's acquisition of ISS says about the industry as a whole. Is the end in sight for independent security vendors? Continue Reading
-
News
24 Aug 2006
Should I back up the operating system files?
We hear a lot about single-instance storage; single-instance backup. When you start backing up operating system files, you will have the same .DLL, for example, on each of your Windows servers -- you may have 100 servers. I would say, if you have a small environment, I wouldn't worry too much about it. But, once you start growing into a larger environment, you probably should not backup operating system files. Continue Reading
-
News
24 Aug 2006
Aren't backups and archives essentially the same thing?
The answer to that can be a "yes" and "no." If we look at a very high level, a copy of data is a copy of data, and that's where a lot of people confuse both as being somewhat the same -- one copy is just kept longer. When we start digging into what a backup is for and what an archive is for, that's when we really start seeing the distinction between the two. Continue Reading
-
News
24 Aug 2006
What do tiered storage and ILM have to do with disaster recovery?
That idea ties back into the topics of data growth, data control, data management and recoverability. Once you start categorizing your data based on criticality and recovery priority, it gives you an indication of your data segments. We have our high-priority data, we have our medium criticality data and we have our low restore priority data. Continue Reading
-
News
21 Aug 2006
Briefs: VoiceCon in the news
This week at VoiceCon we saw everything from managed VoIP services to IP phones made to make mobile workers right at home, wherever they are. Continue Reading
By- Amanda Mitchell, News Editor
-
News
21 Aug 2006
IBM spruces up storage line
IBM floated a raft of announcements across its storage line, but analysts say they are still waiting for the updates stuck in the research phase. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
21 Aug 2006
Update: Microsoft fixes faulty Internet Explorer patch
Update: Microsoft has fixed a faulty browser fix that enabled an exploitable condition. Souces say a compatibility problem with Systems Management Server delayed the fix. Continue Reading
-
News
20 Aug 2006
Twin Trojans use PowerPoint to spread
Researchers aren't yet sure if troublesome new Trojan horse programs are exploiting a new PowerPoint flaw or the vulnerabilities Microsoft patched Aug. 8. Continue Reading
By- Bill Brenner, Senior News Wrter
-
News
17 Aug 2006
Apple fixes Xsan security flaw
Attackers could exploit a security flaw in Apple's Xsan file system to launch malicious code and crash vulnerable machines, but a fix is available. Continue Reading
By -
Feature
17 Aug 2006
Security blog log: Fear and loathing in MS06-040's wake
This week, security bloggers wonder if some of the MS06-040 warnings have gone too far. Meanwhile, Symantec uses its blog to warn about the timed release of exploits. Continue Reading
-
News
15 Aug 2006
Qualcomm to halve storage growth in 2007
Wireless chipmaker Qualcomm expects to slow down its storage growth by at least 50% next year using a capacity utilisation tool from MonoSphere. Continue Reading
By- Jo Maitland, TechTarget
-
News
15 Aug 2006
Cisco says it can't reproduce PIX flaw
Ever since a researcher at Black Hat outlined a flaw in the PIX firewall, Cisco has been trying to reproduce the security hole. So far, the company has been unsuccessful. Continue Reading
By -
News
15 Aug 2006
Cisco boosts VoIP certification
The upgraded CCNP midlevel Cisco certification now incorporates VoIP, security and wireless to boost converged network skills among enterprise professionals. Continue Reading
By- Amanda Mitchell, News Editor
-
News
14 Aug 2006
Mocbot update targets MS06-040 flaw
Security experts raised the red flag Sunday as new malware targets the Windows flaw addressed in the MS06-040 patch. Attackers are using the flaw to expand IRC-controlled botnets. Continue Reading
By -
News
14 Aug 2006
EMC sheds light on RSA integration plans
As the dust begins to settle on EMC's $2.1 billion acquisition of RSA Security, the hard work of integration begins. What's EMC strategy here? Continue Reading
By- Jo Maitland, TechTarget
-
News
10 Aug 2006
Vista kernel limits have security vendors on edge
Microsoft's PatchGuard feature will prevent extension of Windows Vista kernel, and antivirus vendors say it'll make it harder for them to produce good security products. Continue Reading
-
News
10 Aug 2006
Security Blog Log: Israeli-Hezbollah war spills into cyberspace
This week blogosphere warily watches online attacks inspired by the Mideast conflict and rants over the latest security incidents at AOL and the VA. Continue Reading
By -
News
09 Aug 2006
Xiotech resurfaces with data compliance focus
Xiotech has been busy acquiring a legal discovery software vendor and building a data compliance practice, but what about storage? Continue Reading
By- Jo Maitland, TechTarget
-
Feature
07 Aug 2006
Inside MSRC: Time to rethink security workarounds
Christopher Budd of the Microsoft Security Response Center recommends implementing one of several security workarounds to ensure a secure infrastructure until this month's most important Windows update can be installed. Continue Reading
-
News
06 Aug 2006
Security Bytes: CA fixes eTrust Antivirus flaws
Online thieves steal $700,000 from personal accounts, researchers expose e-passport vulnerability; and arrests are made in the VA security breach case. Continue Reading
By- SearchSecurity.com Staff
-
News
03 Aug 2006
EMC updates SAN Advisor design tool
EMC's SAN design tool now recognises zones and allows users to customise rules; HP and EMC sign five-year cross-licensing deal. Continue Reading
By- SearchStorage.com Staff
-
News
03 Aug 2006
Vendors reject preferential knowledge sharing
While Cisco continues to investigate a potential PIX firewall flaw, it and other vendors say sharing security information quickly and indiscriminately is always the best policy. Continue Reading
By- Michael Mimoso, TechTarget
-
News
03 Aug 2006
Ajax threats worry researchers
Black Hat: While it makes smooth Web applications like Google Maps possible, the rush to adopt Ajax may fuel haphazard development and a feeding frenzy among hackers. Continue Reading
By -
Feature
03 Aug 2006
Thwarting IM management challenges
Product review: Information Security magazine's Sandra Kay Miller says Symantec's IM Manager 8.0 has limited public network features, but offers excellent reporting Continue Reading
By- Sandra Kay Miller
-
Feature
03 Aug 2006
Akonix A-Series offers complex, best-of-breed IM security
Product review: Information Security magazine's Sandra Kay Miller says The Akonix A-Series instant messaging security appliances works well but needs better documentation. Continue Reading
By- Sandra Kay Miller
-
Feature
03 Aug 2006
Security event management, no strings attached
Product review: Information Security magazine's Joel Snyder says Check Point's vendor-agnostic Eventia Analyzer 2.0/Eventia Reporter is worth consideration despite limited BI options. Continue Reading
By- Joel Snyder, Opus One
-
News
02 Aug 2006
Mobile security begins with policy
Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy. Continue Reading
By- Andrew R. Hickey, News Writer
-
News
02 Aug 2006
Twelve Microsoft fixes coming on Patch Tuesday
Microsoft Tuesday will release a dozen new security bulletins for its Windows and Office products, likely including fixes for several outstanding PowerPoint flaws. Continue Reading
By- Eileen Kennedy, News Writer
-
News
02 Aug 2006
SRM tools improve storage planning and deployment
Why are storage administrators struggling to identify their storage resources and utilise those resources to their best potential? Continue Reading
-
News
02 Aug 2006
Possible Cisco zero-day exploit revealed at Black Hat
Details of an alleged flaw related to SIP and PIX appliances, briefly mentioned in a Wednesday Black Hat presentation, are being kept under wraps as Cisco and US-CERT investigate. Continue Reading
By- Michael Mimoso, TechTarget
-
News
01 Aug 2006
Litchfield: Database security is 'IT's biggest problem'
At Black Hat USA 2006, database security guru David Litchfield unveils 20-plus IBM Informix flaws that attackers could exploit to create malicious files, gain DBA-level privileges and access sensitive data. Continue Reading
By -
News
01 Aug 2006
Security Bytes: Exploits targeting freshly patched Apple flaw
Apple patches nearly two dozen holes in OS X, but not before exploits are unleashed. Plus McAfee fixes a critical flaw and EMC gets the OK to buy RSA. Continue Reading
By- SearchSecurity.com Staff
-
Feature
01 Aug 2006
PING with Heidi Kujawa
Heidi Kujawa, director of enterprise architecture services for Sony Pictures Entertainment, explains how combatting piracy takes more than just keeping bootleggers out of the theatres Continue Reading
-
News
31 Jul 2006
Security Bytes: ISS warns of new Microsoft Windows flaw
Attackers could exploit the latest Microsoft Windows flaw to crash vulnerable machines and Symantec fixes a Brightmail AntiSpam flaw. Continue Reading
By- SearchSecurity.com Staff
-
News
30 Jul 2006
EqualLogic updates storage provisioning software
Users have more options when it comes to pooling storage with version 3.0 of EqualLogic's array software, but some are wondering whatever happened to the SAS disks. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
26 Jul 2006
DHS puts Zitz in charge of cybersecurity division
American career intelligence officer Robert S. Zitz has taken over day-to-day operations of the US National Cyber Security Division, but his department still has numerous digital defence problems to remedy. Continue Reading
-
News
26 Jul 2006
Mozilla issues critical security updates
New patches to fix 13 software security flaws, eight of which have been deemed critical. Continue Reading
By- Eric Parizo, Senior Analyst
-
News
26 Jul 2006
Blue Cross bears burden of 'no wireless' policy
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something. Continue Reading
By- Andrew R. Hickey, News Writer
-
News
25 Jul 2006
Netscape.com hit with cross-site scripting attack
The popular Web portal was hit by a cross-site scripting attack early on 26 July but Netscape says the problem has been addressed Continue Reading
By- Eric Parizo, Senior Analyst
-
News
25 Jul 2006
Longhorn on the road to Linux compatibility
The next version of Windows Server – codenamed Longhorn – will include virtualisation technology that is interoperable with the open source Linux operating system. Continue Reading
By -
News
24 Jul 2006
Security Bytes: New Microsoft exploits in the wild
The exploits target issues Microsoft patched earlier this month. Meanwhile, flaws are reported in Oracle for OpenView and a Mozilla Firefox keystroke logger is on the loose. Continue Reading
By- SearchSecurity.com Staff
-
News
16 Jul 2006
VPNs and remote access quiz
Take this five-question quiz to see how much you've learned about VPNs and remote access. Continue Reading
-
News
14 Jul 2006
CSI survey: Data breaches still being swept under the rug
The annual CSI/FBI Computer Crime and Security Survey shows companies are reporting fewer financial losses from data breaches. That doesn't mean the good guys are winning. Continue Reading
By -
News
13 Jul 2006
Trojan targets Microsoft PowerPoint flaw
Update: The exploit might be tied to an older flaw in Excel. Attackers who exploit the serious flaw could launch arbitrary code. Microsoft says it is investigating. Continue Reading
By -
News
11 Jul 2006
Critical flaws found in Excel, Flash Player
FrSIRT says holes in Microsoft's spreadsheet program and Adobe's media player could allow attackers to take control of affected machines and initiate malicious commands. Continue Reading
By -
Feature
11 Jul 2006
Inside MSRC: Debunking Excel exploits
Microsoft's Christopher Budd puts the magnifying glass to Microsoft's July bulletinsand says one alleged Excel exploit isn't what it seems. Continue Reading
By- Eric Parizo, Senior Analyst
- News 10 Jul 2006
-
Feature
10 Jul 2006
Case study: A valuable solution
A new telephony and call centre solution from Inter-Tel has transformed the way that e.surv Chartered Surveyors is able to work. Continue Reading
-
News
10 Jul 2006
Security Bytes: Data breach affects 100,000 military personnel
Meanwhile: Phishers use a phone trick to dupe PayPal users; the PCI security standard will get more teeth and a survey illustrates an increase in security breaches Continue Reading
By- SearchSecurity.com Staff
- News 10 Jul 2006
-
News
26 Jun 2006
Dundee to teach ethical hacking BSc
A degree in ethical hacking will be on offer at a Scottish university from the new academic year. Continue Reading
By - News 13 Jun 2006
-
News
01 Jun 2006
FullArmor lives up to its name
PolicyPortal provides an Internet interface to easily configure, monitor and enforce near real-time Active Directory-based policy compliance through client agents. Continue Reading
By- James Foster, CSC
-
News
01 Jun 2006
BlueCat appliance offers rock-solid security
Hot Pick: The Adonis 1000 appliance bundles DNS and DHCP into an enterprise-class appliance for the centralized secure operation of network addressing. Continue Reading
By- Sandra Kay Miller, Contributing Writer
-
Feature
21 Apr 2006
SMB finds the perfect host
When All3Media, a medium-sized TV programming producer, inherited an inflexible communications system, it turned to a more appealing, hosted alternative. Continue Reading
By- Kate Large
-
News
11 Apr 2006
SOA confuses IT heads
Confusion surrounding the real benefits of service-oriented architecture (SOA) means CIOs are wrongly dismissing it as a cynical marketing ploy. Continue Reading
- News 07 Mar 2006
-
Feature
02 Mar 2006
Industry chiefs to declare war on for-profit cyber criminals
IT industry leaders reaffirm the importance of security to a digital economy beset by money-driven cyber criminals. Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications