Enterprise software
Enterprise software covers a wide range of vital IT management decisions, from operating systems to databases, from business applications to integration and middleware. Your software purchasing and development strategy is central to delivering successful IT systems, and we examine the products and trends that help IT managers make the right choices for their organisation.
-
News
08 Nov 2024
Inside Grab’s platform strategy
Grab’s group CTO talks up the super app’s platform strategy, architecture and organisational structure behind its growth across diverse Southeast Asian markets Continue Reading
By- Aaron Tan, TechTarget
-
News
05 Nov 2024
HCLTech to open AI lab in Singapore
The new facility in Singapore will be the latest in HCLTech’s network of global AI labs set up to help businesses deploy artificial intelligence applications and build local talent Continue Reading
By- Aaron Tan, TechTarget
-
Feature
01 Aug 2006
Web services represent security's next battlefront
The evolution and mainstream use of Web services has placed the nascent technology in the crosshairs of attackers, and one firm in particular says it can mitigate the threats. Continue Reading
By -
Feature
01 Aug 2006
PING with Heidi Kujawa
Heidi Kujawa, director of enterprise architecture services for Sony Pictures Entertainment, explains how combatting piracy takes more than just keeping bootleggers out of the theatres Continue Reading
-
News
31 Jul 2006
Security Bytes: ISS warns of new Microsoft Windows flaw
Attackers could exploit the latest Microsoft Windows flaw to crash vulnerable machines and Symantec fixes a Brightmail AntiSpam flaw. Continue Reading
By- SearchSecurity.com Staff
-
News
30 Jul 2006
EqualLogic updates storage provisioning software
Users have more options when it comes to pooling storage with version 3.0 of EqualLogic's array software, but some are wondering whatever happened to the SAS disks. Continue Reading
By- Beth Pariseau, Senior News Writer
-
News
26 Jul 2006
DHS puts Zitz in charge of cybersecurity division
American career intelligence officer Robert S. Zitz has taken over day-to-day operations of the US National Cyber Security Division, but his department still has numerous digital defence problems to remedy. Continue Reading
- Feature 26 Jul 2006
-
News
26 Jul 2006
Mozilla issues critical security updates
New patches to fix 13 software security flaws, eight of which have been deemed critical. Continue Reading
By- Eric Parizo, Senior Analyst
-
News
26 Jul 2006
Blue Cross bears burden of 'no wireless' policy
Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it. That is, until a team of auditors said the company had better do something. Continue Reading
By- Andrew R. Hickey, News Writer
-
News
25 Jul 2006
Netscape.com hit with cross-site scripting attack
The popular Web portal was hit by a cross-site scripting attack early on 26 July but Netscape says the problem has been addressed Continue Reading
By- Eric Parizo, Senior Analyst
-
News
25 Jul 2006
Longhorn on the road to Linux compatibility
The next version of Windows Server – codenamed Longhorn – will include virtualisation technology that is interoperable with the open source Linux operating system. Continue Reading
By -
News
24 Jul 2006
Security Bytes: New Microsoft exploits in the wild
The exploits target issues Microsoft patched earlier this month. Meanwhile, flaws are reported in Oracle for OpenView and a Mozilla Firefox keystroke logger is on the loose. Continue Reading
By- SearchSecurity.com Staff
-
News
24 Jul 2006
Resellers come around to storage virtualization
Storage virtualisation has been around as a concept for years, but value added resellers are finally finding ways to sell it. Continue Reading
-
News
16 Jul 2006
VPNs and remote access quiz
Take this five-question quiz to see how much you've learned about VPNs and remote access. Continue Reading
-
News
14 Jul 2006
CSI survey: Data breaches still being swept under the rug
The annual CSI/FBI Computer Crime and Security Survey shows companies are reporting fewer financial losses from data breaches. That doesn't mean the good guys are winning. Continue Reading
By -
News
13 Jul 2006
Trojan targets Microsoft PowerPoint flaw
Update: The exploit might be tied to an older flaw in Excel. Attackers who exploit the serious flaw could launch arbitrary code. Microsoft says it is investigating. Continue Reading
By -
News
11 Jul 2006
Critical flaws found in Excel, Flash Player
FrSIRT says holes in Microsoft's spreadsheet program and Adobe's media player could allow attackers to take control of affected machines and initiate malicious commands. Continue Reading
By -
Feature
11 Jul 2006
Inside MSRC: Debunking Excel exploits
Microsoft's Christopher Budd puts the magnifying glass to Microsoft's July bulletinsand says one alleged Excel exploit isn't what it seems. Continue Reading
By- Eric Parizo, Senior Analyst
-
Feature
11 Jul 2006
XML Security Learning Guide
Securing XML is an essential element in keeping Web services secure. This SearchSecurity.com Learning Guide is a compilation of resources that review different types of XML security standards and approaches for keeping your XML Web services secure. Continue Reading
- News 10 Jul 2006
-
Feature
10 Jul 2006
Case study: A valuable solution
A new telephony and call centre solution from Inter-Tel has transformed the way that e.surv Chartered Surveyors is able to work. Continue Reading
-
News
10 Jul 2006
Security Bytes: Data breach affects 100,000 military personnel
Meanwhile: Phishers use a phone trick to dupe PayPal users; the PCI security standard will get more teeth and a survey illustrates an increase in security breaches Continue Reading
By- SearchSecurity.com Staff
- News 10 Jul 2006
-
News
26 Jun 2006
Dundee to teach ethical hacking BSc
A degree in ethical hacking will be on offer at a Scottish university from the new academic year. Continue Reading
By -
Feature
19 Jun 2006
Storage Word Search: Summer IT fun
How about some summer storage fun? Try out SearchStorage.com's Word Search game. See if you can find the 15 terms listed. Continue Reading
- News 13 Jun 2006
-
News
01 Jun 2006
FullArmor lives up to its name
PolicyPortal provides an Internet interface to easily configure, monitor and enforce near real-time Active Directory-based policy compliance through client agents. Continue Reading
By- James Foster, CSC
-
News
01 Jun 2006
BlueCat appliance offers rock-solid security
Hot Pick: The Adonis 1000 appliance bundles DNS and DHCP into an enterprise-class appliance for the centralized secure operation of network addressing. Continue Reading
By- Sandra Kay Miller, Contributing Writer
-
Feature
21 Apr 2006
SMB finds the perfect host
When All3Media, a medium-sized TV programming producer, inherited an inflexible communications system, it turned to a more appealing, hosted alternative. Continue Reading
By- Kate Large
-
News
11 Apr 2006
SOA confuses IT heads
Confusion surrounding the real benefits of service-oriented architecture (SOA) means CIOs are wrongly dismissing it as a cynical marketing ploy. Continue Reading
- News 07 Mar 2006
-
Feature
02 Mar 2006
Industry chiefs to declare war on for-profit cyber criminals
IT industry leaders reaffirm the importance of security to a digital economy beset by money-driven cyber criminals. Continue Reading
By- Brian McKenna, Senior Analyst, Business Applications
-
News
27 Feb 2006
Not just a big switch
Fibre Channel directors don't just provide lots of ports, they also offer ways to connect disparate SANs, isolate data and devices within a fabric, and configure throughput for specific applications. We look at how the big three directors match up. Continue Reading
By -
Feature
17 Feb 2006
Be careful you don't get more than you pay for with VoIP
Implementing VoIP is attractive for all companies in particular SMBs. However, there are issues to address that may cost you more than what you save Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
13 Jan 2006
Oracle bundles Fusion tools into one-stop SOA suite
Oracle is offering a one-stop shop to customers seeking to build a service-oriented architecture (SOA) by bundling together several middleware products. Continue Reading
-
Feature
09 Jan 2006
Voicing concerns on Skype
Skype has blazed a trail in the Voice over IP arena; its popularity hasn’t gone unnoticed by the hacker community however Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
18 Dec 2005
Trio of trouble: Malcode targets Windows, IM users
AV firms warn IT shops to guard against Dasher, Bagle and Banbra. Dasher targets a Windows flaw patched in October, while Banbra spreads through IM. Continue Reading
By -
News
30 Nov 2005
Out-of-cycle IE patch may be imminent
Microsoft may release a critical Internet Explorer fix before the next Patch Tuesday, amid reports that malicious code is targeting a memory corruption flaw. Continue Reading
By - News 16 Nov 2005
- News 16 Nov 2005
- News 16 Nov 2005
-
News
14 Nov 2005
Demand for development skills soars as firms seek business edge
Computer Weekly salary survey shows IT departments eager to secure skills for the future. Continue Reading
-
News
06 Nov 2005
Hacking Windows: MSRPC vulnerabilities
In this excerpt from "Hacking Exposed, Fifth Edition: Network Security Secrets & Solutions," authors Stuart McClure, Joel Scambray and George Kurtz introduce MSRPC vulnerabilities and countermeasures. Continue Reading
-
News
20 Oct 2005
Author delves into novel attack methodologies
Review of Silence on the Wire, a book about security attack methodologies such as passive fingerprinting. Continue Reading
-
News
19 Oct 2005
Elements of a data protection strategy
In this excerpt from Data Protection and Lifecycle Management, Tom Petrocelli addresses the importance of securing data for regulatory compliance and outlines the five components of a data protection strategy. Continue Reading
-
News
07 Oct 2005
Service approach will bring benefits to applications development says Gartner
Service-oriented development of applications (SODA) is the best way to approach globally distributed application development and maintenance, according to a new report by Gartner. Continue Reading
-
News
27 Sep 2005
Secure your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information, without sacrificing security? Continue Reading
-
News
26 Sep 2005
Secure the interests of your extended enterprise
How do you achieve the fine balance between ensuring that there is truly free access to sensitive information and applications from both inside and outside the firewall, without sacrificing security? Continue Reading
-
News
26 Sep 2005
Gartner stresses SOA and WS importance
Leading analyst stresses importance of SOA and web services Continue Reading
-
News
20 Sep 2005
SAS drives product roundup
Serial-attached SCSI (or SAS) drives offer significant storage capacity at a much lower cost, while maintaining reasonable performance. Find out who the vendors are in this market. Continue Reading
By- Stephen J. Bigelow, Senior Technology Editor
-
News
18 Sep 2005
CCSP courses, exam changing next month
Those seeking Cisco's security credential and specialization in VPN, firewall and IDS will soon follow different curricula that better reflect the vendor's current product lines. Continue Reading
By- Anne Saita, TechTarget
-
News
13 Sep 2005
Ethernet users given greater product interoperability
A new network hardware testing standard will encourage enterprises, service providers and telcos to adopt cheaper and more flexible Ethernet technology for data, voice and video connectivity. Continue Reading
-
News
09 Sep 2005
Sponsor's Editorial - Making marketing more relevant
Responsys, a premier global provider of on-demand email and lifecycle marketing solutions, has announced Interact 5, the latest version of the company’s email marketing automation software. Continue Reading
-
News
05 Sep 2005
IE 7.0 may usher in wave of RSS exploits
Experts warn that Web-feed enhancements in Microsoft's new Web browser may be just the thing crackers need to compromise networks and private data. Continue Reading
By -
News
05 Sep 2005
Extending perimeters
The news that, up until 2006, 70% of successful wireless local area network (WLAN) attacks will be because of the misconfiguration of WLAN access points and client software is disquieting on a number of levels. Continue Reading
-
News
30 Aug 2005
Antivirus can introduce dangerous network security holes into any OS
AV software is one of the most basic security steps available. It's also yet another gateway for security breaches. Continue Reading
By- Shawna McAlearney, News Editor
-
News
26 Aug 2005
High profile breach brings security to top of agenda
There’s nothing like an apparent breach at a global company to concentrate the mind when it comes to information and data security. Continue Reading
By- Joe O’Halloran, Computer Weekly
-
News
16 Aug 2005
Reduce risks of disaster recovery testing
Untested business continuity plans can leave your firm in the lurch, but taking down live environments is risky and complicated. Continue Reading
By- Matt Stansberry, TechTarget
-
Feature
28 Jul 2005
Lost at sea: securing the channel
As attacks seem to proliferate almost unabated, it’s worrying to think that of the three interested parties in the security technology market — the technology makers, the technology sellers and the technology users—not everyone shares a common view on the importance of the technology. Continue Reading
-
News
28 Jul 2005
Sarbox compliance costing companies
Companies’ required investments to attain compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF). Continue Reading
-
News
24 Jul 2005
Authentication takes a bite out of spam
Network and messaging experts offer helpful ammunition for network managers waving the white flag in the battle against spam. Continue Reading
By- Amy Storer, News Writer
-
Feature
22 Jul 2005
Riding the wave of change
CIOs can thrive as pace of change quickens, argues Des Lee Continue Reading
By- Des Lee
-
News
21 Jul 2005
Users look for value boost from Microsoft licence rejig
Software Assurance needs to offer better support, say IT directors Continue Reading
By- Cliff Saran, Managing Editor
-
News
21 Jul 2005
Sarbox draining corporate security budgets
Corporate investment to comply with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum (ISF). Continue Reading
-
News
20 Jul 2005
Pop quiz: E-mail security
Find out how much you know about securing your organization's e-mail. Continue Reading
-
News
12 Jul 2005
Tony Asaro: Blogs and more
Read what Tony Asaro is talking about in this month's blog, and listen to him speak in a number of webcasts. Continue Reading
-
News
12 Jul 2005
Sarbox challenge drains security budgets
International corporate spending on compliance with the Sarbanes-Oxley data security legislation has come at the expense of dealing with other security threats, according to the Information Security Forum. Continue Reading
-
News
06 Jul 2005
PING with Karen Worstell
The Microsoft CISO discusses how she keeps Redmond and its products secure. Continue Reading
By- By Amber Plante
- Feature 13 Jun 2005
- Feature 13 Jun 2005
-
News
05 Jun 2005
Quiz: Secure Web directories and development, answer No. 1
Quiz: Secure Web directories and development, answer No. 1 Continue Reading
-
News
05 Jun 2005
Quiz: Secure Web directories and development, answer No. 2
Quiz: Secure Web directories and development, answer No. 2 Continue Reading
-
Feature
05 Jun 2005
Storage 911: How to troubleshoot your storage
Our emergency guide takes you through the steps you can take to prevent disaster, and then, more importantly, offers an organized list of usual suspects, from the complex to the deceptively simple. Continue Reading
-
News
04 Jun 2005
Life at the edge part 2: Divide and conquer with DMZs
Learn how a DMZ works and how it can protect Web servers. Continue Reading
-
News
03 Jun 2005
Quiz: Identify and analyze Web server attacks
Test your knowledge of the material covered in the "Identify and analyze Web server attacks" section of Intrusion Defense School. Continue Reading
-
News
03 Jun 2005
Quiz: Identify and analyze Web server attacks, answer No. 2
Quiz: Identify and analyze Web server attacks, answer No. 2 Continue Reading
-
News
03 Jun 2005
Quiz: Identify and analyze Web server attacks, answer No. 4
Quiz: Identify and analyze Web server attacks, answer No. 4 Continue Reading
-
News
31 May 2005
Network configuration: IIS SMTP mail relay service and Microsoft Exchange Server
Learn how to use the IIS SMTP mail relay service to prevent spammers from directly interacting with your Microsoft Exchange Server. Continue Reading
-
Feature
18 May 2005
Controlling IT waste and redundancy through recentralization
A typical decentralized organization has many different departments such as accounting, HR, and manufacturing—all are defining and building IT infrastructures to support applications. In a decentralized environment, there is a structure in place within each of these departments to evaluate and purchase IT equipment and support. This leads to redundant purchases from different departments for similar systems and software. Continue Reading
-
Feature
10 May 2005
Learning Guide: Low-cost storage
Resources on low-cost networking, iSCSI, SATA and IP storage Continue Reading
-
News
21 Mar 2005
Linux lags Windows in new security report
A controversial research paper takes a critical look at two popular platforms' track record on vulnerabilities and fixes. In turn, its findings are facing sharp scrutiny as well. Continue Reading
By- Anne Saita, TechTarget
-
News
21 Mar 2005
Home Office waits for police database case
Second Bichard report reveals concerns about a lack of progress and buy-in from forces around England and Wales for the national... Continue Reading
-
News
16 Mar 2005
RootkitRevealer turns root kits' tactics back at them
A contributor reviews freeware RootkitRevealer from Sysinternals. Continue Reading
-
Feature
16 Mar 2005
Managed services: Looking to the long term
IT directors looking for an easy way to manage increasing volumes of data by buying more hardware could be storing up problems... Continue Reading
-
News
13 Mar 2005
Security Bytes: Turning servers into 'malcode pushers'
In other news, 'antispyware' company shut down during investigation and new Java Trojan hits alternative browsers. Continue Reading
By- SearchSecurity.com Staff
- News 08 Mar 2005
-
News
08 Mar 2005
A sound architecture involves both strong technology and a professional approach
Although many large organisations need to respond rapidly to changes in the market as well as to competition and globalisation... Continue Reading
By- Alan Brown
-
News
07 Mar 2005
Windows vulnerable to LAND attack
Security researchers say this type of attack leaves enterprise customers of popular Windows products open to a denial of service. There is good news, though. Continue Reading
By -
News
22 Feb 2005
Accommodating arrays
Modern storage arrays offer disk types to meet any need -- costly Fibre Channel (FC) disks for high-end applications requiring superior performance and availability, and lower-priced SATA disks for less-critical data. The arrays also come with mixed RAID configurations. But selecting the right mix of disks and RAID levels requires understanding the impact of those decisions. Continue Reading
By -
News
17 Feb 2005
Do you speak geek: All hail e-mail!
Test your knowledge of e-mail security with this quiz. Continue Reading
-
News
03 Feb 2005
Expect 13 Windows patches, some critical
Microsoft will release patches Tuesday to fix critical security holes in Windows Media Player, MSN Messenger, Microsoft Office and Visual Studio. Continue Reading
By -
Feature
14 Jan 2005
Financing the future
Don't get a headache working out the best ways to pay for hardware and software. Danny Bradbury offers a user-friendly guide to... Continue Reading
-
News
20 Dec 2004
Fixes, workaround for Kerberos 5 vulnerability
A security hole could be exploited to launch malicious code. But there are fixes and a workaround. Continue Reading
By -
News
19 Dec 2004
Security Bytes: Be aware of Google Desktop 'glitch'
Cisco acquires Protego; Hotmail switches to Trend Micro; Red Hat, Mandrakesoft and Gentoo fix flaws. Continue Reading
By- SearchSecurity.com Staff
-
Feature
14 Dec 2004
Grid gobbledygook hits storage
Fearful as always of missing the boat, storage vendors are jumping on the grid bandwagon, unveiling visions that are about as useful today as a chocolate teapot. Continue Reading
-
News
09 Dec 2004
Data storage history quiz
We tend to take storage for granted these days, and expect bigger, better and faster performance out of our hardware and software. But did you know that storage has a long and illustrious history that started out not so big or so fast? Take our data storage history quiz and see how much you know about the beginning of data storage. You just might be surprised. Continue Reading
-
News
12 Nov 2004
NTFS permissions
This excerpt from Chapter 5 of "The definitive guide to Windows 2000 security" discusses the advantages of using NTFS for access control. Continue Reading
By- Paul Cooke
-
News
31 Oct 2004
Fast Guide: Storage Management
Managing your storage infrastructure has never been harder. Complex systems, unbelievable data growth rates and squabbling vendors are just a few of the issues hampering your ability to manage storage. This Fast Guide to storage management has everything you need to learn how to plan your storage environment, make sure it's running smoothly and stay on top of the trends fueling the next generation of storage management. Continue Reading
-
News
28 Oct 2004
MoD may write off £200m Chinook helicopters
The Ministry of Defence could write off more than £200m spent on eight Chinook Mk3 helicopters. Continue Reading
By -
News
23 Sep 2004
Multiple strategies guard youth services agency
Major corporations aren't the only ones who need to protect confidential information, ward off spam and malware, and defend against intrusion. Local youth service agencies must do the same, with far smaller budgets. Continue Reading
By- Edmund X. DeJesus, Contributing Writer
-
News
22 Sep 2004
Security Bytes: New .jpg attack imminent; CA agrees to pay $225 million for federal violations
Sanjay Kumar is indicted for securities fraud and conspiracy, while Authorize.Net is knocked offline by massive DDoS attacks. Continue Reading
By- SearchSecurity.com Staff