Security Part I: Strategies
Impenetrable defenses is a costly, illusory objective, so securing your enterprise should strike a balance between protecting corporate assets and breaking the bank A MARTIAL ARTS teacher tells students, “You’re going to get hit.” They learn that although being hit…
Sniffing for sneaks
SourceFire speeds installation, but setup and tuning take sweet time See correction below ONE OF THE major problems with incorporating intrusion detection is that it’s a complex, difficult process. Even if you’re using an open-source product such as Snort (…
Rescue, Linux style
If preserving valuable data is a priority, these tools are worth checking out BACK IN JUNE, I wrote a column about the problems inherent with the ubiquitous Windows rescue CDs that seem to come with most name-brand PCs these days…
The big MMS picture
Emerging Multimedia Messaging Service is a stalking horse for deeper issues CURRENTLY, USERS HAVE a choice of e-mail, IM, and SMS (Short Messaging Service) on cell phones and some converged devices. Now, the industry, or most of it, is gearing…
Trading on the edge
Enron’s story serves as a warning — good technology can’t fix bad business IN THEIR DRIVE TO TAKE Houston-based Enron from a sleepy, regional gas pipeline company to a billion-dollar energy provider, Enron executives knew they needed the best in…
Mail policies made simple, seamless
Omniva effectively enforces retention policies without disrupting existing infrastructure ANYONE IN BUSINESS will confirm that it’s one thing to create a policy and entirely another thing to enforce it. This is especially true when it comes to e-mail. Most enterprises…
Mapping the integration universe
Use a message broker and Web services to rethink your approach to application and systems integration As we pass through new periods of information technology, we carry forward application artifacts from previous periods with us. Depending on the age of…
BindView simplifies security
CEO Eric Pulaski argues the need to reduce the complexities and cost of managing security WITH THE ADVENT of Web services, vendors that specialize in security are being asked to rise to new heights in terms of capabilities and performance.…
Product Snapshot: Tifosi 2002
Tifosi 2002 leverages a component model to integrate enterprise applications August 16, 2002 — In early August, Fiorano Software released Tifosi 2002, a peer-to-peer services integration platform that builds, deploys, modifies, and debugs business processes. The platform includes Tifosi Peer…