Enterprise


Security Software: How Suite It Is

Customers want integrated -- and highly manageable -- security tools. A smorgasbord of best-of-breed tools just can't get it done anymore

IT Escapes Cuts to Business Travel -- For Now

Thanks to skyrocketing gas and airfare costs, a growing number of companies are limiting -- or completely banning -- "non-essential" business travel

Big Iron: The Cost-Cutting Platform

Mainframe shops continue to look to Big Iron for increased operational efficiency and lower costs.

Q&A: Enterprise Modernization

How do your organization's modernization efforts compare with over 1200 organizations?

Experts Advocate Multi-Purpose Approach to Fight Fraud

With the right investigative techniques, experts maintain, fraud-busters can connect the dots, uncover evidence, and combat fraud

Wrappers and Recovery

How prepared are you for a disaster?

Careers: IT Hiring Slowdown Ahead?

Caution in IT hiring plans



Solving Mainframe Entitlement Problems

Strong, effective IT security can be compromised by orphaned accounts and entitlements. We offer strategies to manage these expired accounts and entitlements.

The Convergence of Network Behavior Analysis and Network Performance Management

It’s essential that IT understand the impact on network resources and application delivery of any and all anomalies in network behavior. Anomaly detection tools can help.

SHARE Conference to Delve Deeper into SOA, Virtualization

With focuses on SOA, virtualization, next-generation data centers, and cloud computing, Summer SHARE will likely have plenty to interest attendees.

Why Storage Clouds Are Worth a Closer Look

It's time to take another look at remote storage services.

SQL Injection Attacks on the Rise

SQL injection vulnerabilities are easy -- and cheap -- to test for, regardless of whether you're a good guy or a malicious hacker

Green IT Goals, Actions Far Apart

Almost all IT shops say that boosting energy efficiency is a clear priority, but comparatively few are actually spending money to do it

Gartner Offers New View of Project Management

Used properly, project management offices can help CIOs make better decisions about how and where to spend their IT dollars

Six Myths that Delay Endpoint Data Protection

Why saying "it can't happen to us" isn't a solution

Seven Key Steps on the Road to PCI Compliance

Don’t overlook these seven steps you can take to complete your PCI compliance efforts.

Building a Long-Term IT Strategy

IT is being pushed to do more with less, and has to balance new, more-efficient technologies with support for legacy apps. Part of the problem may be IT itself.

IBM Makes Large Cloud-Computing Investment

Cloud computing isn't just a flash in the pan, advocates argue: it's game-changing.

Two Near-Disasters Highlight Backup/Recovery Deficiencies

During a regional disaster, a large company will quickly discover that the damage to small firms in the area can dramatically reduce its own recovery

Evolution of the LAN: Migrating to an Intelligent Switch

To minimize connectivity costs and ensure your investment addresses future business needs, consider an intelligent switch.