Recent Articles
-
Microsoft to Implement Competency Categorization, Points Accrual System for Partners
Redmond, Wash.— Sticking to the channel roadmap it unveiled last October, Microsoft Corp. is expected to open its Microsoft Competencies and Partner Points components for participation in April, marking a major milestone in its overhauled channel strategy for the next decade. The components are meant to help partners identify their areas of expertise clearly, making…
-
MailSweeper Takes 3-In-1 Approach
Clearswift’s MailSweeper Business Suite, released last month, is a fine example of how context-based anti-spam tools add brawny features in their efforts to stop junk e-mail. MailSweeper Business Suite is a combination of anti-spam software, secure messaging and e-mail-content-policy enforcement. It’s priced at $16,425 for 1,000 licenses and one year of support. The product worked…
-
Check Point Appliance Ably Guards Networks
Check Point Software Technologies Ltd.’s InterSpect 610 provides an Internal Security Gateway—an intrusion protection system designed to protect networks from exploits entering the network via laptops and mobile devices. However, although the appliance admirably protects the network core from attacks, its overall efficacy depends heavily on the user’s network architecture. In eWEEK Labs’ tests, the…
-
Systems Integrator Eases Handoff of IT Baton
When communication is a pillar of your business, migrating to another communication system and then maintaining it once it’s installed can be equally critical. But executing such a move with a small budget and little in-house expertise adds a new set of challenges. Smith, Gambrell & Russell LLP learned this firsthand last year when the…
-
Five Steps to a Solid Security Foundation
Managing enterprise security is one of the most complex and time-consuming jobs imaginable. However, applying the simplest and most basic security measures will protect companies from close to 90 percent of the threats they might face. Here are the five basic steps recommended by eWEEK Labs. Assessment Step 1 Security risks in enterprise IT systems…