I once co-wrote a book on enterprise email where I likened email encryption to a "sucking chest wound." That was in 1997, when you had to do all the encryption key management on your own, a daunting task to say the least.
By David Strom | 22 July, 2015 23:22
The old days of straightforward antivirus software packages are gone -- victim of a changing threat scene in which the dangers are more complex than ever and come from multiple sources.
By Preston Gralla | 20 July, 2015 20:44
Once upon a time, Symantec's brand of Norton security software had one of the most confusing lineups around -- products included Norton 360, <a href="http://www.computerworld.com/article/2488677/application-security/7-all-in-one-security-suites-anti-malware-for-all-your-devices.html?nsdr=true&page=5">Norton 360 Multi-Device</a>, Norton Anti-Virus and Norton Internet Security. Trying to decide which product was the best for you -- not to mention the best priced -- was no picnic.
By Preston Gralla | 20 July, 2015 20:44
McAfee LiveSafe is the best product in McAfee's sizable security portfolio. Its suite offers protection for an unlimited number of Windows PCs, Macs and Android and iOS devices, along with a Web dashboard. There's 1TB of cloud-based storage as well. The whole thing is available for $60 per year.
By Preston Gralla | 20 July, 2015 20:44
The number and complexity of cyber threats leveled against enterprises of all sizes these days is staggering. There's everything from advanced persistent threats created by well-sponsored nation states to disgruntled <a href="http://www.networkworld.com/article/2692093/security0/data-protection-165097-disgruntled-employees-lash-out.html">insiders</a> looking to make a fast buck or enact revenge for some perceived wrongdoing.
By By John Breeden II | 08 December, 2014 22:14
Typically, when I review a solid-state drive (SSD) it comes from one of the half dozen or so big name manufacturers, such as Toshiba, SanDisk, Intel, Micron, Samsung and Seagate.
By Lucas Mearian | 07 November, 2014 07:17
It's no stretch to say that ads are what make the Web go 'round. The content you're reading right now? Paid for by ads. Google, Facebook, Pandora, YouTube? Driven by ads. This is not a new concept: TV and radio have relied on commercials since their earliest days. Because, let's face it, <em>something</em> has to pay for all the free programming and services.
By Rick Broida | 17 October, 2014 21:43
Samsung's new 850 Pro SSD series has up to 1TB of capacity and is designed for workstations and high-end PCs.
By Lucas Mearian | 01 July, 2014 20:08
Whatever your primary OS, Linux distro Tails 1.0 offers a plethora of security features to help you work online without worrying about privacy issues.
By Carla Schroder | 10 May, 2014 05:48
You can't see some malware until it's too late. Sophisticated attacks arrive in pieces, each seemingly benign. Once these advanced attacks reassemble, the target is already compromised.
By David Newman | 05 May, 2014 22:38
If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.
By David Strom | 05 May, 2014 20:38
Everyone needs a Wi-Fi spectrum analyzer, but there are times when analyzing cellular spectrum is also essential. Fluke Networks' new AirMagnet Spectrum ES provides a broad range of capability at a very attractive price. Spectral analysis, a longstanding fixture in electronics and manufacturing test, and, more recently as a valuable tool for understanding coverage, interference, and other elements of Wi-Fi, is the art and science of extracting meaning and insight from wireless systems at Layer 1 -- radio waves.
By Craig Mathias | 24 March, 2014 11:10
Enterprise mobility management (EMM) can encompass a broad range of functions, from managing mobile devices, to applications, expenses, personnel, and policies. But perhaps the most important aspect is mobile information/data/content management, tracking the distribution and usage of sensitive organizational data, as well as ensuring appropriate security and policy compliance.
By Craig Mathias | 20 January, 2014 11:53
PowerCloud Systems has released a cloud-based Wi-Fi solution that fills the gaps between residential products that lack management and features, and enterprise systems that can be overkill in smaller organizations.
By Craig Mathias | 11 November, 2013 12:13
Flexible PKard Reader and elegant Tactivo bring smart card authentication to your favorite mobile device
By Joseph Roth | 09 October, 2013 21:06
Samsung claims its latest consumer drive, one of a new generation of three-bits-per-cell NAND flash devices, has the same endurance and performance, but a lower price, than its predecessors.
By Lucas Mearian | 25 September, 2013 10:07
Earlier this year we tested several consumer-level 802.11ac routers. Here, we take a look at two enterprise-level access points. They're a part of the so-called "Wave 1" phase of the 802.11ac standard: both access points support up to three spatial streams and 80 MHz wide channels, offering theoretical data rates up to 1.3Gbps. But just as we saw with the 802.11ac routers, you won't get throughput rates nearly that fast.
By Eric Geier | 16 September, 2013 10:35
For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login.
By David Strom | 03 September, 2013 10:23
Here are the significant issues that can distinguish one password manager product from another. You'll probably make a similar list of requirements as you do your own research for password managers.
By David Strom | 03 September, 2013 06:04
Flash storage represents a quantum leap from the storage layer in terms of performance, however it is crucial companies understand their I/O profile in order to formulate a successful storage strategy. Find out in this eBook how flash storage can be beneficial for enterprises and useful questions to ask before making an informed decision on the purchase.
- CCSenior Identity ManagerVIC
- CCContract Analyst Programmer (SQL/Oracle/.Net) 160129/AP/vhs-bAsia
- FTHelpdesk support - Level 1VIC
- FTSenior Linux Sys AdminNSW
- FTFull Stack & Mobile EngineersNSW
- CCSharePoint Web DeveloperACT
- FTSoftware Developer - Ruby on RailsNSW
- CCEnterprise ArchitectNSW
- CCHybris Developer - Global ConsultancyNSW
- FTWeb Programmer/ DeveloperVIC
- CCIBM InfoSphere ConsultantACT
- CCJava Developer - Front/ Back EndVIC
- FTWintel EngineerACT
- CCJava Development EngineerNSW
- FTApplications Architect/ Pre-sales (Microsoft Applications)WA
- CCLync/Skype EngineerNSW
- FTLevel 2 IT Support TechnicianVIC
- CCService ModellerNSW
- CCBusiness Objects DeveloperNSW
- CCFront End Developer - MelbourneVIC
- FTServer EngineerNSW
- CCContract Analyst Programmer (JAVA/Oracle/UNIX) 160203/AP/381Asia
- FTNetwork EngineerNSW
- CCOracle Test LeadNSW
- CCObjective ECMS Technical ConsultantSA
Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations. Included are four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.
- Upgrading to SAP Hana? This new tool can help prepare your code
- The eyes have it: How one startup aims to change the future of VR
- Gaming on Linux, Steam machines set to soar with DirectX competitor Vulkan
- Most enterprises plan to boost cloud use this year
- Google didn't abuse its position in Streetmap case, UK court rules
- GitHub apologizes for ignoring community concerns
- New Chromebook won't break with 365-pound person standing on it
- Nasdaq to use blockchain to record shareholder votes
- Pwn2Own contest puts $75,000 bounty on VMware Workstation bypass
- Intel SSDs may get speed, capacity boost with new Micron chips
- Five sue Apple over Error 53 and bricked iPhones
- AT&T to run field trials of 5G wireless in Austin this year
- Apple's iPhone sued for infringement of touch feedback patents
- Need data-science skills? Now your team can learn together
- Hackers of two Ukrainian utilities probably hit mining and railroad targets, too