Brian Prince

DBAs Want to Make Database Migrations Easier

Database administrators are looking for a few more tools in their toolbox when it comes time for database migration. Among the top items on their wish list are tools to bring databases in sync during such a migration, which can be a difficult and complex process in the best of situations. “If there was some […]

Oracle Expands Footprint in Authentication

Oracles acquisition of Bharosa in July caused a stir in the market for authentication tools. On Oct. 22, the acquisition bore its first commercially available fruit in the form of Oracle Adaptive Access Manager 10g, a move company officials hope will expand Oracles footprint in the identity management and authentication space. Oracle is integrating Adaptive […]

Tech Foes Join Forces for Secure Code

Rival technology companies have joined forces to create the Software Assurance Forum for Excellence in Code, a nonprofit organization dedicated to helping software developers deliver more secure products. The idea of the organization is to reduce IT vulnerabilities, improve resistance to attack and protect supply chains by uniting key technology companies. The group, composed of […]

Oracle Database 11g Ready for Windows

For Oracle Database 11g, it was Linux first, then the world—or at least Microsoft Windows. The software giant, based in Redwood Shores, Calif., has released the latest version of its database generally available on Windows. The release includes new Windows-specific features such as database backup and recovery using Windows Volume Shadow Copy Service, as well […]

Deploying In-Line or Out-of-Band NAC

When Binghamton University looked to bring network access control into its residence halls, classrooms, study lounges and other public areas in 2004, Network Manager Joe Roth had a choice to make-to be in-line, or not to be in-line. “We liked several things about the out-of-band [NAC] solutions-if the appliance fails, it leaves the network in […]

RSA Extends Authentication for Mobile Devices

RSA, the security division of EMC, is extending its support for mobile platforms in its upcoming release of RSA SecurID Software Token 2.2 for Symbian OS and UIQ, trying to take advantage of what users already use. “For businesspeople the best authenticator is often a device they already carry,” said Christopher Young, vice president of […]

Imperva Audits Pooled Database Connections

Imperva is expanding its database auditing abilities to enable IT administrators to track changes to the database that occurred via pooled connections. Officials at the Foster City, Calif.-based company said they added the new functionality—dubbed SQL Connection User Tracking—Oct. 22 to their SecureSphere Database Security Gateway and SecureSphere Database Monitoring Gateway products to aid enterprises […]

IBM Data Management Strategy Focuses on Security

Much of the talk at this years Information On Demand conference in Las Vegas has centered on IBMs belief in optimizing data in real time to add business value. But underlying IBMs strategy is a focus on security, illustrated by the acquisition of Princeton Softech and now the deepening of a partnership with encryption specialist […]

McAfee and Covad Become Comrades in SMB Security

McAfee is extending its program to target small and midsize businesses with a partnership with Covad Communications Group, an integrated voice and data communications provider. Covad can now bundle McAfee Total Protection for Small Business services with its broadband products. The goal, officials at both companies said, is to provide small-business customers with an affordable […]

MP3 Spam Scam Hits In-boxes

Elvis and the Beatles probably never could have imagined they would one day be used to commit stock fraud. But that is exactly what is happening, as spammers have taken to using MP3 attachments in e-mails named after recording artists as part of a pump-and-dump stock scam. Most of the e-mails have no subject name; […]