The next front in the struggle to make IT “greener” will unfold at your fingertips -- on the ubiquitous end-user desktop
If you need to provision, protect, migrate, dedupe, encrypt, replicate, recover, and archive data sources, ODS may be just what you’re looking for.
According to Gartner, cloud computing still has some maturing to do
One of the biggest threats facing your organization is already installed on your desktops: admin rights for end users
Security vendors are stepping up their efforts to close the gap between security and operations
Data governance implementation should be the top priority for enterprises undertaking three initiatives.
Many say that newer, tougher compliance is inevitable. What's at issue is just how demanding it will be.
How a new spec targets data protection on PCs, servers, mobile devices, and hard disk storage devices.
When used together, server virtualization with N-Port ID Virtualization (NPIV), blade servers, and Fibre Channel SANs provide a mature, robust infrastructure for data centers.
Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.
Both NetMaster and SysView boast GUI and usability improvements. Along with a lower-cost software licensing option and you have pair of old tools reborn.
All things considered, 2008 was a quiet but industrious year on the security front.
It was a pretty good year, for IT spending at least.
Adopters cite OSS' low-cost licensing, flexibility, and -- crucially -- freedom from a Microsoft lock-in as its most attractive features.
Full-disk encryption specifications developed by the Trusted Computing Group (TCG), including key management and self-encrypting drives, can keep data safe.
Encryption directly on the storage device provides the simplest and most effective means to obtain a trusted storage system.
An out-of-band security fix from Microsoft put administrators in a familiar but tough spot: potentially damned if they patched and damned if they didn't.
"Going Green" is about transforming the static, reactive, and largely inert data centers of today into what proponents call a "living organism."
The z10 BC isn't as big or brawny as its beefy sibling, but it has lots of power and is priced to move. Call it a mainframe system for the rest of us.
Only 10 percent of organizations are actually using effective anti-spam technologies