management

Management buyout saves Foursticks

Management buyout saves Foursticks

Troubled network performance software developer Foursticks has been saved by a management buyout.
Staff Writers Jun 20 2005 11:00AM Software
Review: LANDesk Management Suite

Review: LANDesk Management Suite

The LANDesk Management Suite is much more than just an auditing tool. It is a comprehensive group of tools for generally managing a corporate network which might include large numbers of clients.

Julian Ashbourn Jun 9 2005 12:00AM Security
The roadmap to identity management

The roadmap to identity management

What does Identity and Access Management (I&AM) really mean to a business? The answer varies depending on who you talk to. For example, consider the viewpoints of the three board-level people most directly involved in decisions on any I&AM investment: the CEO, CFO, and CIO/CTO.
Stuart Okin Jun 3 2005 12:27PM Security
Complying with identity management

Complying with identity management

In recent years a series of laws, regulations and standards have been introduced in Europe and North America, which directly or indirectly make new demands on companies’ IT security and IT risk management. Whereas in the past IT managers and security personnel largely autonomously determined a company’s IT security policy, IT administrators are now faced with the necessity of analyzing the relevant industry-specific regulations and implementing these in a range of concrete measures.
Dr. Martin May 31 2005 11:06AM Security
Review: Wireless Site Management

Review: Wireless Site Management

Computer Associates' Wireless Site Management 4.0 is a fully featured WLAN security and management suite. The software is mainly aimed at larger organizations, but it could be implemented for any company running a wireless network.

Peter Stephenson,CeRNS, May 10 2005 12:00AM Security
The five Ps of patch management

The five Ps of patch management

Security and vulnerability patching has become one of the top concerns for IT managers, but has also left many IT teams fighting a losing battle as the job of patching competes with daily system maintenance and security tasks.
Staff Writers May 9 2005 11:06AM Security
Security event management $800 million market by 2008

Security event management $800 million market by 2008

Enterprises will spend $330 million on security event management (SEM) solutions this year and will spend $800 million on the technology by 2008, according to research firm Yankee Group.
Marcia Savage Apr 27 2005 3:33PM Security
Drive ICT success from the top: study

Drive ICT success from the top: study

Effective management of ICT investments was a key factor to success, according to a new Australian study.
Vivienne Fisher Apr 21 2005 3:55PM Strategy
Is your security event management tool credible?

Is your security event management tool credible?

Security Event Management (SEM) vendors often talk about scalability when addressing the degree to which their products can accommodate growth in a customer's increasing network and/or security requirements.
Roberto Angelino, Apr 20 2005 12:32PM Security
Systems management gaining importance to security

Systems management gaining importance to security

IT managers are increasingly relying on systems management software to tackle security issues, according to results from a new survey.
René Millman Mar 16 2005 12:27PM Security
So, friend or foe? ID management and access control

So, friend or foe? ID management and access control

Companies need to rationalize their access policies if they are to comply with the new regulations, as Charles Hayhoe explains
Charles Hayhoe Feb 21 2005 5:14PM Security
Intel to offer new chip management control

Intel to offer new chip management control

Intel is taking out-of-band technology to the chip level.

Staff Writers Dec 29 2004 9:59AM Hardware
Calculating ROI for identity management projects

Calculating ROI for identity management projects

More efficient management, more productive staff and improved data security; just some of the advantages of Identity Management. On the other hand it can often involve high implementation costs and levels of project complexity. Only consistent ROI calculations can accurately define the benefits of such a solution. While it is relatively easy to establish concrete ROI criteria for the topic of efficiency, it is much more complicated to do so for the topic of security.
Dr. Martin Nov 24 2004 2:47PM Security
WebCentral signs new management

WebCentral signs new management

Incognito ASP WebCentral has appointed two new general managers to help drive business across its consumer, SMB and enterprise divisions.
Staff Writers Nov 17 2004 12:00AM Networking
Microsoft showcases new management, security offerings

Microsoft showcases new management, security offerings

Bill Gates showed off new technology to ease management and patching at the Microsoft IT Forum '04 in Copenhagen, Denmark.
Jon Tullett Nov 16 2004 3:44PM Security
CA strengthens ID management product suite

CA strengthens ID management product suite

Staff Writers Nov 12 2004 4:58PM Security
Data management not a priority despite security concerns

Data management not a priority despite security concerns

Despite regulatory pressures and security concerns, senior corporate managers do not place enough importance on data quality, according to a survey by PricewaterhouseCoopers.
Marcia Savage Nov 10 2004 11:01AM Security
Identity management market remains badly fragmented

Identity management market remains badly fragmented

The market for identity management is crowded with point and multipoint solutions and is sorely lacking in end-to-end solutions for heterogeneous networks, newly published research from Yankee Group has revealed.
Robert Jaques Oct 22 2004 11:22AM Security
Telindus boosts security with peer-to-peer policy management

Telindus boosts security with peer-to-peer policy management

Telindus France has bolstered its network security with a policy management system designed to improve traffic management and reduce the impact of viruses and worms across its range of service offerings for broadband ISPs in France.
Robert Jaques Oct 18 2004 4:31PM Security
Identity Management: A Key Enabler of IT-Business Alignment

Identity Management: A Key Enabler of IT-Business Alignment

As technologies have improved and the value of the Internet to business has exploded because of technologies like Java and XML, the abilities of vendors to graphically and accurately represent the status of hardware, network and application components became much more robust.
Gary Holland Oct 6 2004 3:36PM Security

Log In

  |  Forgot your password?