McAfee beat market expectations and posted 27 percent year-over-year revenue growth in the third quarter of 2008. All together, the company posted $410 million in revenue in the quarter-largely on the back of its corporate business division. The division’s revenues grew 33 percent year over year to $247 million. McAfee officials credited the growth to […]
Researchers at IBM revealed new technology they say can protect online banking transactions from malware and man-in-the-middle attacks. The company has developed a prototype of a small USB device dubbed the Zone Trusted Information Channel. According to IBM, the product plugs into the USB port of any computer and creates a direct, secure channel to […]
Symantec reported significant year-over-year growth in its most recent quarter, riding on a strong uptick in its storage and services business. In the second quarter of fiscal 2009, which ended for Symantec Oct. 3, the company’s net income reached $140 million-a $90 million increase over the income the company reported during the same period in […]
Images of IBM’s Latest Answer to Online Banking Security No Title A diagram of online banking transactions. No Title IBM showcases ZTIC. No Title Another look at IBM’s ZTIC. No Title
As actor Paul Newman’s character said in “Cool Hand Luke”: “What we’ve got here is a failure to communicate.” The well-known quip is relevant to IT security in many enterprises. According to a survey by InsightExpress, one of the key issues surrounding IT is that many employees simply do not understand or know the security […]
It’s been a busy year for IBM, from the acquisition of Cognos to the release of numerous products. From his seat in IBM‘s cockpit, Steve Mills has played an important role as his company developed and expanded on its Information On Demand strategy. IOD-a combination of data management, analytics, and industry-specific applications and services-is designed […]
Microsoft is downplaying reports of malware exploiting the critical security hole it patched last week. On Oct. 23, the company released an emergency out-of-band patch for a vulnerability affecting the Server service. According to Microsoft, if the service receives a specially crafted RPC (remote procedure call) request, an attacker could exploit the vulnerability to run […]
IBM and Effigent are teaming to bring Tivoli data protection technology to Macs. Under an OEM agreement, Effigent has embedded IBM Tivoli Continuous Data Protection for Files software in its new product, CDP4Mac. According to IBM, the deal is part of the company’s strategy to find new markets and sales channels for IBM software products […]
About a month after Ambuj Goyal stepped into the role of general manager of IBM Information Management in 2005, he articulated a vision of the company’s plans at an analyst forum in Boston. That vision is called Information On Demand, IBM’s answer to helping businesses better derive value out of their data. A marriage of […]
Sometimes it’s better to do things the old-fashioned way-at least partly. Perhaps that’s the lesson to be learned from a report released by Princeton University that outlines security concerns surrounding an electronic voting machine used in New Jersey. With the U.S. presidential election looming, the report states it is possible to hack the Sequoia AVC […]