Enterprise


Security Briefs: Breaches Increase, Trojans Displace Worms

Despite increased security spending, the number of security breaches also increases. Plus, how Trojan applications have displaced worms and viruses as top threats—and why.

Five Tips for Securing VoIP

Thanks to immature standards, competing protocols, and nascent products, keeping VoIP secure isn’t easy. Here’s where to start.

Backup/Recovery Strategies: Protecting Road Warriors (Part 1 of a 3-part Series)

IT must acknowledge the importance—and risks—of mobile computing tools and start building processes to protect corporate data.

Distributed Computing, Specialty Engines Bring Companies Back to the Mainframe

The cost of distributed complexity—which is also measured in air conditioned BTUs and kilowatts per hour—is about to get even more expensive

Unified Theories of Data Management

How do we manage the combined output of all of the event logs produced by all the available, and frequently used, management tools?

Sometimes It’s Not a Storage Issue

Trying to reconcile the technologies and products offered by the storage industry with the actual problems confronting IT can seem like a thankless job.

Anti-Spyware Gets Rootkit Removal

New anti-spyware functionality highlights the enterprise security question: should you go for best of breed or opt for a security suite?



Podcast: Protecting Mobile and Remote Users

Best practices to keep mobile and remote users safe

Survey Says Big Iron a Solid Bet for the Future

The mainframe is entrenched for the long haul, respondents say

Beyond Logs: Security Event Management Market Heads For Shakeout (Part 2 of 2)

Experts predict imminent SEM market consolidation. The upside: lower software costs, easier usability, and improved efficiency. Even so, users will be faced with a dizzying array of options.

Making the Business Case for Big Iron

A growing number of mainframe pros are trying to educate their colleagues and C-level executives about the business case for Big Iron.

Tool-and-Die Makers in a Knowledge Economy

The full potential of tools to support knowledge work remains unrealized

Reducing Complexity in the Enterprise Data Center

Businesses need to be agile. An interconnect-driven server architecture may help. Here’s how.

Spyware Threats Skyrocket for Enterprises

A new study shows spyware is the fastest-growing threat to enterprises.

Best Practices for IT Migration Projects

Eight best practices to keep the user experience front and center during IT migration projects.

Records Managers Are Suddenly Sexy

Data management should stand on its own as an umbrella effort driving all of IT’s efforts, because the essential task of IT is data management.

Careers: The Incredible Shrinking Economic Recovery

When is an economic recovery not an actual recovery? When it benefits the few at the expense of the many.

Security Briefs: JavaScript Worm, IBM DB2 Vulnerability, NIST Performance Metrics

Dealing with an e-mail worm targeting a Web application, and a vulnerability in IBM DB2. Plus, how to create a performance metrics program.

IBM’s Embarks on SOA Blitz

A future of reusable services got a step closer to reality last week when IBM announced its new SOA Business Catalog

Podcast: Getting the Storage Infrastructure Info You Need

Storage consumes as much as one-third of an IT budget, but getting information about storage (especially storage utilization) has been difficult at best.