ADS BY GOOGLE

SurfControl has announced that Virtua Health is using SurfControl Web Filter for Microsoft ISA Server and SurfControl's Adaptive Threat Intelligence service to safeguard its people and IT systems against blended Internet threats. As a result, Virtua Health says it has improved security...
With growing threats of identity theft and information security breaches, enterprises are taking to a unified storage management approach with emphasis on data security by encrypting and addressing retrieval aspects, according to Network Appliances.
A new SME-targeted box from IBM maxs out at 8GB of memory, double its predecessor's, for multitasking workloads. With a 64-bit operating system, IBM figures the performance of CPU-intensive applications like Autodesk's 3ds Max can improve by up to 39%.
Intel said at IDF this week that its new performance-per-watts mantra is going to conjure up a new category of ultra energy-efficient 'Handtop PC' devices that provide a converged communication and PC-like experience but require less than a watt of processing power and weigh under a po...
A pair of young men, one from Morocco and one from Turkey, may join the virus criminal hall-of-fame, if authorities have indeed nabbed the right guys. Farid Essebar, 18, was arrested in Morocco, while Atilla Ekici, 21, was arrested in Turkey on Thursday. They will be prosecuted in thos...
Multi-core platforms are key to delivering these new ways of using technology and providing the horsepower for embedded IT capabilities, according to Intel SVP Pat Gelsinger. The company demonstrated a number of platforms at the IDF in San Francisco, based on upcoming dual-core Intel X...
Intel CEO Paul Otellini said that the company's next-generation microprocessors will be more efficent, in a speech at the Intel Developer Forum in San Francisco. Otellini said that energy savings of $1 billion per year can result from widespread use of the company's latest technology.
According to a recent Inside Gartner Top View Report by Ed Younker, Gartner Research, enterprise users should not assume that their Macs are immune to security flaws. Even though the growing number of Macintosh security flaws won't affect most enterprises, businesses using Macs must ...
Version 1.1 of Apple's Security Update 2005-007 is now available from Apple's website or via the Mac OS X 'Tiger' automatic update system. This update replaces a previous version that addressed several problems but caused many applications to crash in the process.
Sygate's technology will complement Symantec's presence on the endpoint to create a holistic solution to address the security, compliance, and remediation requirements of large enterprises, according to Symantec. Endpoint compliance solutions help enterprise organizations enforce secur...
The Zotob worm is similar to the Sasser worm which struck in May last year and the Blaster worm that crippled companies? systems in 2003. However, it has apparently spread more quickly than any other worm.
The U.S. Patent and Trademark Office has rejected an application by Apple for the iPod, based on previous filings by Microsoft. This sort of technology tussle within the PTO is not unusual, although the circumstances around this particular fight are.
Le lancement du programme d'intégration des applications d'entreprise est une initiative d'envergure des services informatiques d'Intel. Cette stratégie permet à Intel de passer d'une infrastructure multi-applicative point à point à une solution rationalisée qui libère les applications...
Ryman's blog can be read at ryman.eclipsedevelopersjournal.com. He is the latest i-technology celebrity whose blog is syndicated on SYS-CON's branded blog-n-play community pages next to James Gosling, Marc Fleury, Ben Forta, John C. Dvorak, Alan Williamson and others.
In a rare double whammy, Rackable Systems' new C2002 server won the 'Best Server' award in the 2005 LinuxWorld Product Excellence Awards this week in San Francisco; Rackable's Parallel File System Solution won 'Best Utility/Grid Solution.' The awards are managed by LinuxWorld Magazine ...
'To avoid remote exploitation, organizations of all sizes should address these particular vulnerabilities immediately,' said Marc Maiffret, co-founder and chief hacking officer, eEye Digital Security, as Microsoft's 'Patch Tuesday' yesterday brought word of six security issues affectin...
A team at Sunbelt Software, developers of CounterSpy spyware protection, discovered a massive identity theft ring while auditing CoolWebSearch, include eBay and bank information.
Attorney Jennifer Granick writes in her blog that she did not see how either Cisco or ISS had a solid case in squelching researcher Michael Lynn's now-infamous Black Hat conference prsentation on copyright or intellectual property grounds.
Next week sees another of Microsoft's Patch Tuesdays, for August, and this time as well as releasing no fewer than 6 different software patches, the company is also going to release an update of its Windows Malicious Software Removal Tool.
'Xdrive will further enhance AOL's consumer storage offerings to deliver a more safe and secure digital lifestyle for our members,' said Gio Hunt, Senior Vice President of New Business Ventures, AOL Digital Services, as America Online, Inc. yesterday announced that it has acquired Xdri...
As forecasted last year at the Virus Bulletin 2004 conference by Symantec researcher Eric Chien (pictured), viruses targeting the MSH shell, or Microsoft Command Shell (codenamed 'Monad') have now been devised by an Austrian virus writer as proof-of-concept of a possible exploit. It is...
IntegriGuard, LLC, a national Medicare frauddetection and prevention firm based in Omaha, announced today theappointment of James G. Huse, Jr. to the position of Chief ExecutiveOfficer (CEO). The appointment was effective July 19, 2005.
The Imation Micro Hard Drive makes sharing and transferring files easy thanks to the Micro Hard Drive's USB 2.0 high speed interface as well as its ability to transfer files across PC, Mac and Linux platforms.
Safehaus endorsement of the OATH Reference Architecture and use of the HOTP algorithm specification in HausKeys represents an important milestone towards the ubiquity of strong authentication. This project targets enterprise organizations, allowing them to use OATH and Safehaus to depl...
The McAfee Foundstone On-Demand Service incurs zero deployment, administration or maintenance costs. The McAfee Operations Center hosts the On-Demand service, alleviating the customer's need to deploy or maintain a vulnerability management system of their own. Current and prospective c...
'Ciscogate' T-shirts went on sale last week in Las Vegas, after Michael Lynn - who gave a controversial presentation on Cisco security (or, rather, insecurity) at the Black Hat Security Conference - was the subject of a permanent injunction preventing him from using any Cisco code in h...
iAnywhere has announced the general availability of Afaria 5.3., an update to its frontline management and security solution. The new version includes enhanced support for wireless device platforms, adds significant security features for handhelds and converged devices, and improves th...
Oracle & HP announced a new world record TPC-H three terabyte data warehousing benchmark result for Oracle Database 10g Release 2 on HP Integrity servers, demonstrating both companies' ability to manage large-scale data warehouses.
'The acquisition of iDefense expands the VeriSign suite of managed security services, providing customers with additional capabilities with which to proactively protect their networks from vulnerabilities and attacks,' said VeriSign executive Judy Lin in outlining the company's strateg...
Oracle has announced market leading independent software vendors (ISVs) are demonstrating broad, global support for Oracle Fusion Middleware. Agile, Business Objects, Fidelity, FileNet, Mercury and RSA Security are some of the ISVs that are using or integrating with the software to pro...
Coverity and Digeo are working together on research and development to identify and eliminate device driver defects in Linux.
Much is being made about network attached storage (NAS) and storage area networks (SANs) as options for the high-volume data storage needs of modern enterprises. Yet when you look closely, these are not competing solutions, but rather complementary technologies that are best suited to ...
Phishing, malware and identity theft are among the concerns of RSA Security's web seminar on June 29, and its agendat at its European conference in October. The company will address how enterprise IT can react organizationally to such threats while preserving information access by cust...
Shareholders at both Symantec and Veritas approved the companies' merger, allowing the creation of a company that will now include both information security and information storage as its core competencies.


ADS BY GOOGLE