A little imagination can be a great thing when it comes to planning for a disaster. The disasters we might encounter as IT managers are no different.
With ILM, Informatica says it has the answer for harried data management pros. Analysts caution that Informatica's strategy will take time to gestate.
In a tough economic climate, IT organizations will look to virtualization to reduce TCO, slash their energy costs, and keep up with competitors
The next front in the struggle to make IT “greener” will unfold at your fingertips -- on the ubiquitous end-user desktop
If you need to provision, protect, migrate, dedupe, encrypt, replicate, recover, and archive data sources, ODS may be just what you’re looking for.
According to Gartner, cloud computing still has some maturing to do
One of the biggest threats facing your organization is already installed on your desktops: admin rights for end users
Security vendors are stepping up their efforts to close the gap between security and operations
Many say that newer, tougher compliance is inevitable. What's at issue is just how demanding it will be.
Data governance implementation should be the top priority for enterprises undertaking three initiatives.
How a new spec targets data protection on PCs, servers, mobile devices, and hard disk storage devices.
When used together, server virtualization with N-Port ID Virtualization (NPIV), blade servers, and Fibre Channel SANs provide a mature, robust infrastructure for data centers.
Both NetMaster and SysView boast GUI and usability improvements. Along with a lower-cost software licensing option and you have pair of old tools reborn.
Microsoft's decision to exit the consumer security space reflects a fundamental shift in the market.
All things considered, 2008 was a quiet but industrious year on the security front.
It was a pretty good year, for IT spending at least.
Adopters cite OSS' low-cost licensing, flexibility, and -- crucially -- freedom from a Microsoft lock-in as its most attractive features.
Full-disk encryption specifications developed by the Trusted Computing Group (TCG), including key management and self-encrypting drives, can keep data safe.
Encryption directly on the storage device provides the simplest and most effective means to obtain a trusted storage system.
An out-of-band security fix from Microsoft put administrators in a familiar but tough spot: potentially damned if they patched and damned if they didn't.