While information security has became the most important aspect for any form of business process, the mushrooming of vendors in …

Juniper introduces Adaptive Threat Management
Juniper is this week introducing software that lets security platforms – even those made by other vendors – share and …

Security expert worries about smart phone, TinyURL threats
It’s just that F-Secure’s chief security advisor doesn’t want people overlooking the other 29,999 malware files his company sees a …

Users gain options for mobile voice encryption
U.S. President Barack Obama's dilemma over the security of his BlackBerry has given rise to an increased interested in systems …

Corporate SaaS considerations myriad, complex
Amid the growing popularity of software-as-a-service, IT managers are faced with a sometimes monumental task of developing big-picture strategies and …

Virtualisation: What are the key steps?”
For those of us who grew up praying in the temple of the mainframe, the concept of virtualization is nothing …

Cyberoam UTM brings On-Appliance SSL VPN
Cyberoam has announced the introduction of on-appliance SSL VPN on its UTM appliances. Cyberoam now delivers secure, remote access to …

Most Oracle database shops don’t mandate security patch use
In a pair of online surveys that were jointly conducted between May and August of last year by the International …

Check Point overhauls its security software architecture
Check Point is in the midst of a major overhaul of its security software architecture so customers can pick and …

More specialty Linuxes to the rescue
The day of the mold-your-own OS has come, and Linux is the clay. Linux provides free and open access to …

Project management for networking geeks
Network professionals are typically well versed in the technical aspects of networking: router and switch configuration, server deployment and management, …

Fortinet expands security portfolio
The new FortiWeb-1000B is a mid- to large-enterprise product and is the first in a family of Fortinet web application …

Cisco ASR 1000 router
In an exclusive test, the ASR not only moved traffic at 20Gbps but also did so while running QoS, security …

Kaspersky releases AV prototype for Windows 7
The new technical prototype of Kaspersky Anti-Virus is designed to secure computers running under Windows 7. The beta test version …

‘Next-Gen IT security is required’
Providing a safe and secure environment within the constraints of today’s budgets and regulations is a challenge for top management …

Paramount warns against data theft
Providing a safe and secure environment within the constraints of today’s budgets and regulations is a challenge for top management …

The ‘n’ stands for now
Without delving too deeply into the past, we all remember the war-driving horror stories: buggy Wired Equivalent Privacy implementations, 802.11b …

BlackBerry still targeting businesses
While competitors like the Apple iPhone and the budding Google Android platform have garnered a lot of attention lately, Research …

Project management for networking geeks
Network professionals are typically well-versed in the technical aspects of networking: router and switch configuration, server deployment and management, and …

Wi-Fi hotspot horrors
Laptops are the main business tool for most mobile workers, and connecting those devices to the Internet via free public …