Juniper strengthens appliances to remote attacks

Juniper strengthens appliances to remote attacks

Juniper Networks is expanding the security capabilities of a number of its appliances to better protect enterprises from remote attacks....

July 15th, 2009 Howard Solomon

Why enterprises aren

Why enterprises aren

Enterprises may have green initiatives to reduce paper, but going paperless isn’t one of them. “I rarely find any big...

April 27th, 2009 Jennifer Kavur

Blue Coat advances integration with Packeteer gear

Blue Coat advances integration with Packeteer gear

Blue Coat Systems Inc. is laying out a vision it calls the application delivery network to describe what its stable...

February 8th, 2009 Tim Greene

Seven steps to streamlined data governance

Seven steps to streamlined data governance

Companies today are under increasing pressure to make better business decisions in less time, with less risk, while producing higher...

November 30th, 2008 Marty Mosely

Do you know where your data is?

Do you know where your data is?

Information assets must be managed and governed like financial assets, according to an EMC Corp. executive. But new data from...

October 23rd, 2008 Rafael Ruffolo

Vendors tackle virtualization security

Vendors tackle virtualization security

Technologies that promise to virtualize servers, applications and desktops can also introduce vulnerabilities, according to industry watchers and a handful...

September 11th, 2008 Denise Dubie

Laptops can be seized at the U.S. border.

Laptops can be seized at the U.S. border.

Travelers beware: U.S. agents now have the authority to seize and retain laptops indefinitely, according to a new policy detailed...

August 5th, 2008 Agam Shah

Can the Olympics really threaten your IT security?

Can the Olympics really threaten your IT security?

Just like the hundreds of Canadian athletes heading to Beijing, IT managers may have to plan for the Olympics too....

July 31st, 2008 Rafael Ruffolo

Principal Analyst, network security, Infonetics

Principal Analyst, network security, Infonetics

Companies buy network access control products because of security concerns over outsiders accessing their networks and compliance with Payment Card...

July 16th, 2008 Greg Meckbach