environments

EMC claims to halve storage needs

EMC claims to halve storage needs

Celerra Plug-Ins for VMware Environments.
Iain Thomson Mar 11 2010 7:09AM Storage
CA unveils expanded virtualisation portfolio

CA unveils expanded virtualisation portfolio

Greater visibility into virtual infrastuctures.
Rosalie Marshall Oct 27 2009 7:00AM Software
Gartner touts enhanced security for virtual environments

Gartner touts enhanced security for virtual environments

Social network providers should enhance the security controls that are available to their users, analysts say.
Staff Writers Sep 22 2008 4:09PM Security
McAfee secures virtual environments

McAfee secures virtual environments

Software patches offline virtual operating systems without bringing them
online.
Dave Bailey Sep 16 2008 2:14PM Security
Gartner predicts user-centric PC environments

Gartner predicts user-centric PC environments

Analyst warns of major IT infrastructure upheaval.
Bobby Pickering Oct 11 2006 9:59AM Hardware
Managing information security in modern commercial environments

Managing information security in modern commercial environments

We began this series of articles with the observation that recent advances in the area of network technology and the success of the Internet have resulted in a new business model. This new model has resulted in a number of new challenges in the area of information security which, although largely understood, are only partially resolved. As a result, information security-related risk has been growing rapidly in the last few years and companies will need to take a more proactive stance to managing this risk in order to continue to enjoy the benefits that technological advances have made possible.
Steve Purser Jun 15 2004 12:09PM Security
Managing information security in modern commercial environments

Managing information security in modern commercial environments

Previous articles in this series have outlined the challenges facing the present-day information security manager, presented an approach to meeting these challenges and analysed the purpose of the consolidation phase in some detail. We now turn our eyes to the second phase of the approach – the strategic planning cycle.
Steve Purser Jun 8 2004 11:37AM Security
Managing information security in modern commercial environments

Managing information security in modern commercial environments

The previous article in this series described an overall approach to securing information and provided a high-level description of the consolidation period and the strategic planning cycle. We continue this development by taking a more detailed look at the consolidation period.
Steve Purser Jun 1 2004 12:01PM Security
Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

Managing Information Security in Modern Commercial Environments, Part 2 – A Pro-Active Approach

In the first article of this series, we identified and provided examples of the types of issues that need to be resolved if organisations are to correctly manage risk in the area of information security. If we combine the impact of these trends and issues with the fact that most enterprises are being forced to cut costs in order to remain competitive the true magnitude of the problem becomes apparent. Simply put, information security managers have to secure more complex environments, faster and using less resources.
Steve Purser May 24 2004 5:37PM Security
Future Challenges in Pervasive Computing Environments

Future Challenges in Pervasive Computing Environments

What is the pervasive computing paradigm?
Sadie Creese Jan 12 2004 1:37PM Security

Log In

  |  Forgot your password?