If you are ultra paranoid, what could be better than hiding your network traffic in such a way that no one could possibly intercept it? This is what Unisys is offering with its new Stealth appliance, which could make man-in-the-middle attacks and keylogger exploits obsolete, or at least more difficult to mount.
The Apple Mac has played an important part of my professional journalism career for at least 20 of the years that I have been a writer. One Mac or another has been my main writing machine since 1990, and has been in daily use, traveling around the world several times and my more-or-less constant work companion. It is a tool not a religion, yet I have been quite fond of the various machines that I have used.
For enterprises trying to get a handle on password management, the good news is that there are products that can help implement stronger password policies for end users logging into corporate and personal Web-based services, as well as for employees who share a local server login.
We all know that relying on a simple user ID and password combination is fraught with peril. One alternative is to use one of the single sign-on solutions we reviewed last year, but there are less expensive options that could also be easier to install.
As businesses make more use of social networks, the number of engagement, analysis and monitoring tools has exploded. Enterprises are trying to understand their return on social media investments, to find out if their Twitter and Facebook marketing campaigns are actually delivering customers. They want to track social mentions across multiple networks and be responsive to both kudos and complaints.
We are awash in passwords, and as the number of Web services increases, things are only going to get worse. Trying to manage all these individual passwords is a major problem for enterprise security. Many end users cope by re-using their passwords, which exposes all sorts of security holes.
As more people telecommute, having a reliable way to connect via desktop video conferencing takes on greater importance. And for employees working in the office, Web-based meetings are a cheaper and less time consuming alternative to business travel.
We set up a variety of meetings on each of the services and then connected via different desktops, browsers, and mobile clients to see how each displayed the meeting content and handled the audio connection.
iAsset is a channel management ecosystem that automates all major aspects of the entire sales,marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.
Copyright 2014 IDG Communications. ABN 14 001 592 650. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of IDG Communications is prohibited.