Enterprise


Improve New App Implementation Using Your Old Environment

By proactively managing new technology implementations and fully understanding the old IT environment, your organization can meet end-user expectations faster while managing the overall impact to your network.

Q&A: Addressing BYOD with Identity-Based Security

Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.

IAI: Big Data Analytics for Data Security

IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.

Tape's Diamond Jubilee

In the 1990s, tape fell out of favor, but on the 60th anniversary of this technology, it's finding a reversal of fortune.

The CCO’s Dirty Little Secret

A look at the true cost of compliance failures and how to avoid being buried in trouble.

Q&A: The Evolution of Printing in a Mobile World

Think printing is just for creating hard-copy reports? Think again.

The New VDI-in-a-Box: Simple to Pilot, Seamless to Scale

The market has shown that desktop virtualization needed to be simplified. With the evolution of new VDI-in-a-Box solutions, it will be.



Behind IBM's Bifurcated Hybrid Computing Strategy

For most organizations, choosing between Big Blue's two hybrid computing visions is simple, but what about shops that need both? That's where it gets tricky.

Q&A: What CIOs Must Understand about Public and Private Clouds and PaaS

What should a CIO consider when moving to Paas? What criteria should the CIO use, and what misconceptions about the cloud must be overcome?

An Introduction to Deep Content Inspection

Traditional deep packet inspection may no longer be able to protect your environment. We look at a new approach -- deep content inspection.

Q&A: IT's Evolving Big Data Landscape

As the buzz over big data grows, what's changed in the last year? How has machine-generated data changed the way IT tackles big data?

5 Projects for Purging Data and Managing Long-Term Liability

These steps will help you begin building and executing a defensible deletion strategy.

Tackling Today's Firewall Management Issues

Thanks to the ubiquity of firewalls, security administrators have no shortage of options and solutions. We examine the state of firewall management in today's data center.

Outsourcing Activity Showed Healthy Growth in 2011

Outsourcing activity grew by 7.8 percent last year, with Indian-based providers and cloud-based services reaping most of the benefit.

Top 5 Reasons To Use Load Balancers

Load balancers play a vital role in any organization where productivity must remain high. Here are five reasons you need to put a load balancer to work in your environment.

The Network’s Role in Securing Cyberspace

No single technology can enable a fully secure network. The three-layer model we present can guide your organization in making key improvements to your network security.

Making Big Data Useful with BPM

Nothing can stop the deluge of data, so IT must be savvy and implement solutions that target critical business processes and have the technology to successfully parse and engage with meaningful data sets to stay competitive.

Q&A: Why Big Data Security in the Cloud is No Small Matter

Big data and cloud computing are two top-of-mind technologies. What benefits can IT enjoy by bringing them together?

IBM Expands Its PureSystems Pitch

If IT's too costly, that's because it's too labor-intensive. IBM positions PureSystems as a focused effort to cut -- if not slash -- these labor costs.

Using IDV and VDI to Cut Computing Costs

Intelligent desktop virtualization can complement or upgrade your VDI implementation to save you money and aggravation, and it doesn't require a rip-and-replace project.