Enterprise


Analysis: RSA SecurID Token Vulnerabilities Back in the Spotlight

The other shoe finally dropped in the case of the SecurID data breach at RSA. Could the fallout have been avoided?

Q&A: Wi-Fi Drives VPN Adoption at Swiss Insurer

Getting and staying connected was key to this Swiss insurance company, but Wi-Fi access meant it had to find a VPN solution.

The Holy Grail of Storage Efficiency, Part 3

The impact and importance of virtualized storage and the cloud.

Q&A: How to Successfully Migrate Legacy Data

Updating applications with current technology means IT must make sure no data is left behind.

Extreme Collaboration and the Cloud

Although cloud computing gets all the attention, extreme collaboration, an emerging business model, will ultimately deliver value well beyond current market expectations by enabling faster and better business transformation.

Q&A: Tackling "Big Data" Challenges

How big is big data, and how can you get it under control?

Security Vulnerabilities Down but Still Strong

Although the frequency of security vulnerabilities continues to decline, vendors were still preoccupied with patching last year.



Why Hardware-based WANs Are Obsolete

Hardware solutions are costly and time-consuming. Is it time you moved to a software solution?

Careers: IT Jobs Growth a Double-Edged Sword

The economy last month added more new IT jobs than at any point over the last four years, but the picture is changing radically.

Q&A: Best Practices for Enterprise-Scale Identity and Access Management Systems

What is IAM and how can you make an IAM project a success?

IBM Bringing Windows to the Mainframe Later This Year

IT mainframe pros will have to wait until Q4 to get their first look at IBM's Windows-on-zBX offering. Will it be worth the wait?

5 Best Practices for Reducing IT Complexity

Can your business users trust your IT department? A new approach to enterprise automation may help IT better manage IT complexity and enhance that user/IT trust.

Q&A: Best Practices for Working with Unstructured Data

What is unstructured data and how should IT search on and store it?

5 Tips for Choosing a Managed Service Provider for Your Multivendor Environment

Managed services help enterprises enjoy the benefits of best-of-breed equipment when deploying converged communications.

Q&A: Benefits and Best Practices of Application Performance Management

What is application performance management, how can it reduce the number of availability incidents, and what best practices can help ensure your APM initiative is a success?

Can Your Data Storage Process Stand Up in Court?

Why you need a defensible data retention and collection process.

How Identity and Access Intelligence Maximizes Identity and Access Management

Forward-thinking organizations will use identity and access intelligence to extract actionable insights from the IAM process and place them in the hands of business managers.

How BPM Can Transform and Empower Your Enterprise

Three examples demonstrate how self-service in the workplace can help us streamline business operations.

Analysis: The Oracle-Intel-HP Fallout Revisited

IT pros believe Oracle's move has less to do with cost savings and more to do with a strategy to negatively impact the hardware sales of partner/rival HP.

10 Reasons Why Architects and Developers Should Care about Cloud Computing

Cloud computing isn’t just about outsourcing IT resources. We explore ten benefits IT architects and developers will realize by moving to the cloud.