Virtualization can create single points of failure. We show you how to protect yourself.
With mergers and acquisitions and the growing need to cut data center costs, data center consolidation is on the minds of many enterprises. We look at the steps IT can take to make for a successful consolidation project.
Security vendors are stepping up their efforts to close the gap between security and operations
What technologies and best practices can make a data center greener?
When used together, server virtualization with N-Port ID Virtualization (NPIV), blade servers, and Fibre Channel SANs provide a mature, robust infrastructure for data centers.
Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.
Both NetMaster and SysView boast GUI and usability improvements. Along with a lower-cost software licensing option and you have pair of old tools reborn.
All of the Energy Stars in the world will not keep the lights from going out.
All things considered, 2008 was a quiet but industrious year on the security front.
It was a pretty good year, for IT spending at least.
Full-disk encryption specifications developed by the Trusted Computing Group (TCG), including key management and self-encrypting drives, can keep data safe.
Adopters cite OSS' low-cost licensing, flexibility, and -- crucially -- freedom from a Microsoft lock-in as its most attractive features.
Even before green got hot, it was apparent to many IT mavens that storage was actually consuming the most power and generating the most heat in their shops.
Mainframe pros have joined with IBM to tout the virtues of Big Iron-based cloud computing.
Encryption directly on the storage device provides the simplest and most effective means to obtain a trusted storage system.
Big Iron ISVs maintain the mainframe is hot. In the current economic climate, they suggest, it could really sizzle.
We explore the challenges of capacity planning and how IT can best balance performance and risk in virtualized environments.
Organizations should either implement a more secure version of WPA or switch to WPA2, the impregnable successor to WPA
How to keep IT systems running during the post-Thanksgiving shopping rush
An out-of-band security fix from Microsoft put administrators in a familiar but tough spot: potentially damned if they patched and damned if they didn't.