Microsoft To Patch Newest IE Flaw
Microsoft has confirmed a new, unpatched vulnerability in Internet Explorer, and promised to fix the problem with an update on Oct. 10.
A Bad Call for IP Telephony
While conventional telecom providers will soon be able to cut costs, many VoIP service providers will be forced to increase them.
Rollout: eTelemetry's Metron
Metron tracks down network slackers and miscreants and does so out-of-band, so users are unaware that Big Brother is watching.
E911 for VoIP
Advancements in E911 for VoIP provide the same level of accurate location information to emergency responders we've come to expect from wired phones.
Of all the policy development acronyms out there, the three you really need to know are ISO, ITIL/ITSM and COBIT. We provide an overview of this powerful trio.
Rollout: RedSeal's SRM
SRM 3000 not only shows threats to your systems, it also tells you how those threats can traverse your network and how much havoc they're likely to wreak.
Rollout: SmoothWall's Corporate Guardian 5
Corporate Guardian blocks employees from surfing the Internet for personal use, but lets administrators loosen the reins during breaks, lunch and after business hours.
Policy Workbook: E-Discovery
Many courts now require requested information to be supplied in digital format. Prepare for the inevitable by developing an e-discovery policy and assigning an IT person as your group's legal/compliance
10 Steps to Mobilization
A mobility project can transform your enterprise--if you avoid the complexity and cost pitfalls. We offer a road map to a successful mobile application deployment.
Is There Money to Be Made in Wikis?
No longer strictly off-the-cuff Web sites, wikis are being used in thousands of corporations. Now one start-up hopes to turn them into lucrative collaborative tools.
Although compliance with specific regulations certainly requires a good bit more than simple common sense, keeping data safe usually demands exactly that.
Rollout: ShoreTel's E911 and Salesforce.com
A reasonable start for an up-and-comer, but a lack of Web services and smaller size put ShoreTel's telephony apps in a slightly different league than veterans such as Avaya
Compliance Policy Development
The best way to stay out of the regulatory hot seat and keep the compliance police at bay is to develop a comprehensive set of well-written policies. We examine your
NWC Interview: Mark Russinovich, Microsoft
With his company--Winternals Software--recently acquired by Microsoft, Mark Russinovich has joined the MS Platforms and Services division. He discusses his goals within his new company and what he hopes to
Policy Workbook: Unified Message Archiving
Letting users decide what to keep and what to delete isn't a policy, it's an invitation to anarchy. A messaging-retention policy covering not only e-mail but IM, voice and video
IEEE: No Comments, Please!
The IEEE 802.11n task group isn't likely to have a final wireless standard until 2008, in part because the group is obligated to respond to comments on the draft standard--all
Hactivism Group Launches Anonymous Browser
A group of computer hackers and human rights workers have launched a specially-crafted version of Firefox that claims to give users complete anonymity when they surf the Web.
Mac Virtual Machine Update Runs Vista
Parallels releases previews of updates to its virtualization software for both the Mac OS and Windows that let users run Windows Vista alongside other operating systems.
Switched PCIe: Better Bandwidth?
NextIO's PCIe-based technology removes switching from the blade to improve processing efficiency, increase bandwidth and offer greater flexibility.
ISS: IBM's Red-Headed Stepchild
IBM can't stop gushing over the managed security services business it acquired from ISS. But it seems to be completely ignoring ISS' IPS software and appliance business.
Small Biz Goes Mobile
A recent Yankee Group survey indicates that small enterprises are encouraging employees to get e-mail and calendaring over their mobile devices.