Brian Prince

Greenplum Offers Greener Pastures in Data Warehousing

Greenplum wants to challenge the heavyweights in the data warehousing space, and it is banking on scalability, performance and pricing to do so. The company was founded in 2003 and counts Oracle, Teradata and Netezza among its chief competitors in the data warehousing market. However, the data warehousing space is crowded with other, larger players […]

Moving up the Stack with AVG Technologies

What’s in a name? A lot, if you ask the folks at AVG Technologies, formerly Grisoft. Officials at the security company, based in the Czech Republic, said they hope that aligning the company’s name with the title of its flagship product, AVG Anti-Virus, along with the recent acquisition of Exploit Prevention Labs, will be enough […]

McAfee Lays Out 2008 Road Map

With 2007 in the rearview mirror, McAfee officials have designed a road map for the current year touching on endpoint, network and Internet security. McAfee’s new strategy is meant to capitalize in particular on opportunities in endpoint security, an area where the security vendor made a number of plays last year. Those included the release […]

McAfee Bucks Glum Outlook

McAfee reported continued year-over-year growth in revenue and income in its final earnings report for 2007. “In the fourth quarter, we delivered our strongest sale execution in three years,” said Dave DeWalt, McAfee’s chief executive officer in a conference call announcing the earnings. Company revenue stood at $356.5 million, up 17 percent from 2006’s fourth […]

DLP, DAM Share Common Data Security Objectives

Database Activity Monitoring and Data Leak Prevention may have the same focus-securing data-but they operate in two different areas. Still, it all comes down to data, and while that may not mean the two products will become one, DAM could benefit from the content-awareness of DLP (Data Leak Prevention) products, analysts said. “Most every security […]

Cognos a Key Building Block in IBM’s Data Strategy

NEW YORK-When IBM first announced plans to buy Cognos and expand the companies’ longtime partnership, many industry observers counted it as another example of consolidation in the business intelligence market and a furthering of IBM’s Information On Demand strategy. Now, on Feb. 6, only days after the roughly $5 billion acquisition closed, IBM has released […]

Minimizing User Rights Can Increase Security

Sometimes, less is more-at least when it comes to user rights and security. Taking a least-privilege approach to user accounts is a key part of any in-depth defense strategy, many analysts and security pros say. “I think it’s very important … not even just as [a component] of security, but in the broader sense [of] […]

Symantec Virtualizes Message Traffic Security

Symantec is treading deeper into the realm of virtualization with a new version of its messaging security product that allows users to instantly adjust spam and virus filtering capacity without having to add or configure the physical infrastructure. Symantec Mail Security 8300 Series Virtual Edition is built with several features designed to help enterprises deal […]

New PostgreSQL Database Ready to Go

The new version of the PostgreSQL open-source database hit the streets Feb. 4 with a host of new features to enhance performance to meet the data management needs of enterprises and large organizations. While still not as widely used as MySQL, in the open-source database world, PostgreSQL has sought to make a name for itself […]

Discovering Data, then Protecting It

Tizor Systems has launched a new consulting service to help companies discover confidential data as well as gauge and manage risks. The company is leaning on its experience in the data activity monitoring space with the Tizor Discovery Service, an offering aimed squarely at helping businesses find sensitive data, identify risks posed by current operating […]