News

News

  • January 15, 2007 15 Jan'07

    New Exchange Server tools named as Products of the Year

    SearchExchange.com's editors sat down this past fall to assess the 2006 crop of third-party Exchange Server administration products. Find out what products made our "A" list.

  • October 18, 2006 18 Oct'06

    Phishing: A whale of a problem for enterprises

    Phishing is no longer just a consumer problem, say experts. The scams are hurting companies' reputations and bottom lines.

  • October 18, 2006 18 Oct'06

    Three ways phishers are hooking you

    Researchers say the bad guys are getting a lot better at catching users on the phishing hook. Three methods are of particular concern.

  • October 12, 2006 12 Oct'06

    New phishing threat outpaces Netsky-P

    A new phishing threat targeting clients of a German-based bank is surpassing global detections of the prolific Netsky-P malware.

  • October 10, 2006 10 Oct'06

    IM, blogs next target for litigation

    In litigation, email is still the No. 1 target of subpoenas for electronic records. But IMs and blogs are easily targeted, too, and need attention.

  • Sponsored News

    • Discovering the Business Value of Streaming Analytics

      With streaming analytics you can solve business problems in new ways and seize new revenue opportunities. You can reduce costs and increase efficiency while improving the safety of employees and the security of assets and intellectual property. See More

    • Transform Your Data to Transform Your Business

      B2B value chains have always been complicated webs of different data types and standards. During the past few years, however, complexity has increased dramatically, with staggering levels of data growth and the deployment of innovative new IT initiatives, such as cloud computing, the Internet of Things (IoT), social media and big data analytics. See More

    • Three Use Cases for Interactive Data Discovery and Predictive Analytics

      Interactive data discovery and predictive analytics technologies allow business users and analysts to identify important trends and relationships in data sets and drill down into questions from any angle. They also allow business users to collaborate with specialists to create, refine and select the best predictive models. See More

    • Six Steps to Modernizing Your B2B Architecture

      This is a critical time in the evolution of business-to-business integration. Companies are becoming much more reliant on digital technologies for day-to-day business activities. IDC says digital transformation is changing the way enterprises operate and reshaping the global economy. See More

    View All Sponsored News
  • October 06, 2006 06 Oct'06

    E-discovery rules double-edged sword for CIOs

    The new rules regarding electronic discovery show a growing appreciation for the vastness and value of electronically stored data. But don't expect them to make your job easier.

  • October 06, 2006 06 Oct'06

    PhishTank casts its net for malicious email

    PhishTank, a new information clearinghose for phishing attack data, not only archives suspected and confirmed phishing emails, but also enables contributors submit and access data.

  • October 05, 2006 05 Oct'06

    BlackBerry vs. the world

    BlackBerry has been the heavyweight enterprise mobility champion for a long time now, but there are several new contenders entering the ring looking to slug it out for the title.

  • October 05, 2006 05 Oct'06

    Mobility pumps up gym equipment vendor

    Wireless work order software beamed to BlackBerrys has boosted productivity for a New England company that sells and services gym equipment.

  • October 04, 2006 04 Oct'06

    Phishing secrets revealed

    Get an overview of how phishing threatens Exchange Server from a leading authority on phishing technology, and learn what you need to do to protect your data.

  • September 28, 2006 28 Sep'06

    Dell, Symantec simplify Secure Exchange for SMBs

    With Secure Exchange, SMBs have a step-by-step blueprint to deploying a secure Microsoft Exchange environment, courtesy of Dell and Symantec.

  • September 26, 2006 26 Sep'06

    Unsecured devices worry IT professionals

    IT admins keep working to make networks secure even as more unsecured personal gadgets, like smart phones and BlackBerrys, find their way into companies.

  • September 20, 2006 20 Sep'06

    Instant messaging boom brings security concerns

    Instant messaging (IM) has made significant inroads to the enterprise, but using public IM applications may open up security holes in the network.

  • September 19, 2006 19 Sep'06

    BlackBerry Pearl and other slick devices bring new challenges

    BlackBerry this week unveiled its Pearl, a slick handheld that makes older BlackBerrys appear clunky and antiquated. What can mobile managers expect as these hot new devices infiltrate the market and eventually the enterprise?

  • September 15, 2006 15 Sep'06

    BlackBerrys suck juice out of Exchange storage

    Users find ways around the extra load on Exchange systems posed by handheld devices.

-ADS BY GOOGLE

SearchWindowsServer

SearchEnterpriseDesktop

SearchCloudComputing

SearchSQLServer

Close