Drew Robb - Article Archives - Page 7

Affording Disaster Recovery

March 30, 2005
Disaster recovery solutions don't come cheap but, with a little planning and foresight, DR doesn't have to be an all or nothing proposition.
READ MORE

Harnessing the Flood of Security Data

February 25, 2005
IT departments are struggling to manage the deluge of security data that overwhelms their systems and their work days.
READ MORE

Battling Spam with an Array of Weapons

January 13, 2005
Battling spam is no easy thing. It often takes more than one kind of tactic and more than one kind of weapon. Here's a look at the different multi-faceted approaches.
READ MORE

Using SIM Software to Deal with Security Overload

December 30, 2004
When IT and security managers are trying to handle 5,000 to 10,000 security incidents a second, they need a technology that will help them visualize what is happening on their network. Is SIM software the answer?
READ MORE

Securing Data on Your Old, Dead Servers

December 21, 2004
Server disposal can be a weak link in enterprise data security. Don't forget to scrub them... and then maybe take a hammer to them.
READ MORE

Locking Up All of That 'Free Information'

December 7, 2004
The open source community goes with the saying, ''Information wants to be free''. But does free necessarily mean safe? And how do you safely lock it down?
READ MORE

Simplifying SCM with Appliances

November 16, 2004
Secure Content Management appliances are catching on in smaller offices where ease-of-use is critical.
READ MORE

Buying into SCM -- The Price of Protection

November 16, 2004
Increased security concerns, along with compliance needs, are pushing the adoption of Secure Content Management software. Why is it needed and what can it do? Simplifying SCM with Appliances
READ MORE

Who's in Charge of this Network?

November 8, 2004
You think you're keeping all of the bad guys out with your fancy perimeter defenses? Think again. The biggest dangers may already be lurking inside.
READ MORE

DRM: Salvation from Regulatory Purgatory?

November 5, 2004
The need to comply with government and industry regulations is driving corporations to protect critical data and content. To meet this need, a host of technologies under the broad umbrella of Digital Rights Management has emerged.
READ MORE

OpenVMS Gets a Case of the DT's

August 18, 2004
Legacy OS carves a niche in disaster recovery.
READ MORE

OpenVMS: An Old OS Hasn't Lost Security Footing

July 13, 2004
Though some have thought that OpenVMS is yesterday's operating system, it's actually powering a lot of businesses, showing off its security and reliability.
READ MORE

Securing your Storage Assets

July 13, 2004
If you can't afford a second data center for disaster recovery, what can you do to physically protect your environment?
READ MORE

Getting Aggressive in Battling Spam

July 7, 2004
Since we're a long way from email Utopia, here are some weapons in your ongoing battle against spam.
READ MORE

Integrated Disk-based Backup at JetBlue

May 26, 2004
Like many growing companies, JetBlue Airways struggled with an ever-lengthening backup window. By adding disk-based backup, the airline cut its backup window by half and reduced the labor involved by IT personnel.
READ MORE

Improving Disaster Recovery Without Breaking the Bank

May 6, 2004
FleetBoston Financial recently took on its disaster recovery time. Our Datamation reporter takes a look at how the company improved its system without breaking the bank.
READ MORE

Storage Security: Getting Beyond M&M SANs

February 25, 2004
Like the candy-coated treats, SANs are an irresistible lure to criminals that can't wait to get to the soft, sweet center.
READ MORE

Case Study: The Stocks Must Go On

January 15, 2004
Despite blackouts, disasters, and human error, financial systems must keep running. NYFIX met this challenge by migrating to enterprise-class backup systems.
READ MORE

Is the Tide Turning in Battle Against Hackers?

January 12, 2004
How are we really doing in terms of computer security? Scanning the news, it looks like we are under constant attack. Our eSecurityPlanet reporter takes a look at changes in offenses, and defenses, and figures out where we stand.
READ MORE