|
|
The Root Of All Evil? - Rootkits Revealed |
|
Awareness of rootkits has risen in recent years, but as with worms, viruses and other forms of malicious software (malware), the term rootkit is applied unselectively to a range of technologies and has attracted a number of not very ... |
|
|
|
|
|
21.02.07
|
|
|
|
|
Key Elements To An Effective Business Continuity Plan |
|
One of the biggest challenges in continuity planning is identifying and protecting essential elements. An effective plan must be departmentally broad, and consider the needs of the entire enterprise. The goal is to understand what ... |
|
|
|
|
|
07.02.07
|
|
|
|
|
Understanding VPN Technology Choices |
|
Telecommunications networks are evolving naturally toward IP-enabled platforms as a replacement for private lines. Networks are also converging, since with IP technology, a single network can support both voice and data ... |
|
|
|
|
|
07.02.07
|
|
|
|
|
Dramatically Enhance Business Performance With IP Communications |
|
It is not often that a real opportunity comes along to dramatically transform the way you do business making it more cohesive, effective, productive and profitable, all with a single holistic approach. But such an opportunity is now ... |
|
|
|
|
|
07.02.07
|
|
|
|
|
3G Mobile Network Security |
|
Mobile operators need to recognize their newfound role as internet service providers (ISPs). No longer do they just provide cellular voice services; now they also provide highspeed Internet Protocol-based (IP) data services. So as ... |
|
|
|
|
|
07.02.07
|
|
|
|
|
Selecting Next-Generation Online Collaboration Services |
|
The environment in which the Worlds largest corporations operate has never been more complex, or more challenging. People working at all levels within these leading companies must develop and implement winning competitive ... |
|
|
|
|
|
06.02.07
|
|
|
|
|
Time For An IT Waste Directive? |
|
The issue of Waste is becoming more and more pressing in many areas. For example, four million mobile phones were sold in the UK alone at Christmas 2004, replacing older models and meaning another four million older unfashionable ... |
|
|
|
|
|
06.02.07
|
|
|
|
|
Operationalising Security & Policy Compliance |
|
At the heart of all data transactions is a trust between buyer and seller, employer and employee, corporation and shareholder. We trust that the relationship between the owners of personal data, the corporations that hold it in ... |
|
|
|
|
|
06.02.07
|
|
|
|
|
Security Solutions For HIPAA Compliance |
|
HIPPA (The Health Insurance Portability and Accountability Act of 1996) was enacted to establish guidelines within the health care industry to ensure the privacy of patients and the physical and technical security of their medical ... |
|
|
|
|
|
06.02.07
|
|
|
|
|
Addressing The Need For Secure File Transfer |
|
Many factors are driving the growing need for secure file transfer in business today. Organizations recognize the value of using software specifically designed to make transferring files secure, convenient and reliable. Based ... |
|
|
|
|
|
29.01.07
|
|
|
|
|
Accelerating Integration With Verastream Host Integrator |
|
Time is money, and todays IT organizations have less of both. Even so, the explosion of customer-facing applications and the high expectations of technically savvy customers leave them no choice. They must give partners and ... |
|
|
|
|
|
29.01.07
|
|
|
|
|
An Introduction To Service-Oriented Integration |
|
Service-oriented integration is proving itself as an effective solution for extending existing information assets. There is growing requirement, however, to use the functionality in existing applications to support new application ... |
|
|
|
|
|
08.01.07
|
|
|