Four reasons IT executives charged with business continuity planning, risk management, and disaster recovery must consider their employees and operations heavily in their plans.
This approach can help you achieve data classification results dramatically faster than conventional methods.
A simple and affordable change you can make today can mitigate the risks of the DNS layer.
Harried by legal, regulatory, or competitive concerns, organizations are increasingly paying much more attention to their desktop backup strategies.
Symform positions itself as the most clever and affordable take on online disaster recovery to date.
Building a business continuity plan is an ongoing job, but mature technologies exist that meet the range of key requirements.
Oracle's move shakes up the virtualization status quo
Sun says its Nehalem product line is “significantly differentiated” from other Xeon 550-based systems in a very crowded market.
By trumpeting new energy and power-management features, Intel and its partners hope to make a business case for Xeon 5550.
Detailed tips and tricks for getting the most out of MySQL in the enterprise
A closer look at the components and best practices for success with your data loss prevention project.
A little imagination can be a great thing when it comes to planning for a disaster. The disasters we might encounter as IT managers are no different.
With ILM, Informatica says it has the answer for harried data management pros. Analysts caution that Informatica's strategy will take time to gestate.
In a tough economic climate, IT organizations will look to virtualization to reduce TCO, slash their energy costs, and keep up with competitors
The next front in the struggle to make IT “greener” will unfold at your fingertips -- on the ubiquitous end-user desktop
If you need to provision, protect, migrate, dedupe, encrypt, replicate, recover, and archive data sources, ODS may be just what you’re looking for.
According to Gartner, cloud computing still has some maturing to do
One of the biggest threats facing your organization is already installed on your desktops: admin rights for end users
Security vendors are stepping up their efforts to close the gap between security and operations
Many say that newer, tougher compliance is inevitable. What's at issue is just how demanding it will be.