Drew Robb - Article Archives - Page 6

New HIPS Technology Takes on Zero-Day Attacks

February 1, 2006
Some industry watchers say host-based intrusion detection systems may take the lead in battling zero-day attacks.
READ MORE

How to Improve on Wireless Security

January 10, 2006
If you're looking to secure an enterprise WLAN, many industry observers are pointing IT managers to WPA2.
READ MORE

Tales from "De Crypt"

November 16, 2005
Few things get the vultures circling like news of a security breach. A look at how one company assures confidentiality by encrypting all of the data that touches its SAN.
READ MORE

The Incredibly Shrinking Backup Window

October 19, 2005
Data Domain aims to reduce backup times by up to 20x, and prods tape loyalists to ''move on''.
READ MORE

Adding Biometrics to Enterprise Security Arsenal

October 18, 2005
Are biometrics ready for widespread deployment? What are the pros and cons of going with this security weapon?
READ MORE

Disaster Recovery Sites: How Far Away is Far Enough?

October 4, 2005
The recent devastation from Gulf Coast hurricanes raises an important question for enterprises: How far away should your disaster recovery site be?
READ MORE

Symantec-Veritas Deal Proves Timely

August 5, 2005
Panned at first, the merger of security and storage giants turned out to be well-timed.
READ MORE

Hospital Treats its Own Spyware Infection

June 17, 2005
A Seattle hospital had a serious spyware issue, and IT administrators knew they needed to treat it quickly before confidential information was put at risk.
READ MORE

To Go Corporate, the Grid Must be Secured

June 7, 2005
As companies increasingly begin to look to grid computing, major security concerns will need to be addressed. What are the problems, and how can they be fixed?
READ MORE

Disaster Recovery Vs. Business Continuity

April 28, 2005
Think disaster recovery and business continuity are the same thing? Think again. You better know the difference and you better be prepared for both.
READ MORE

Corporate Data Leaks Spur Interest in Storage Security

April 21, 2005
High-profile data security breaches are boosting the fortunes of storage security vendors. Will national legislation follow?
READ MORE

Affording Disaster Recovery

March 30, 2005
Disaster recovery solutions don't come cheap but, with a little planning and foresight, DR doesn't have to be an all or nothing proposition.
READ MORE

Harnessing the Flood of Security Data

February 25, 2005
IT departments are struggling to manage the deluge of security data that overwhelms their systems and their work days.
READ MORE

Battling Spam with an Array of Weapons

January 13, 2005
Battling spam is no easy thing. It often takes more than one kind of tactic and more than one kind of weapon. Here's a look at the different multi-faceted approaches.
READ MORE

Using SIM Software to Deal with Security Overload

December 30, 2004
When IT and security managers are trying to handle 5,000 to 10,000 security incidents a second, they need a technology that will help them visualize what is happening on their network. Is SIM software the answer?
READ MORE

Securing Data on Your Old, Dead Servers

December 21, 2004
Server disposal can be a weak link in enterprise data security. Don't forget to scrub them... and then maybe take a hammer to them.
READ MORE

Locking Up All of That 'Free Information'

December 7, 2004
The open source community goes with the saying, ''Information wants to be free''. But does free necessarily mean safe? And how do you safely lock it down?
READ MORE

Simplifying SCM with Appliances

November 16, 2004
Secure Content Management appliances are catching on in smaller offices where ease-of-use is critical.
READ MORE

Buying into SCM -- The Price of Protection

November 16, 2004
Increased security concerns, along with compliance needs, are pushing the adoption of Secure Content Management software. Why is it needed and what can it do? Simplifying SCM with Appliances
READ MORE