The New Meaning of Software Quality

Building software faster doesn't mean the software is better. What your IT organization may need is an agile quality process.

5 Tips for Switching Vendors

Don't let the deluge of financial offers blind you to the best vendor for your needs. These five tips will help you make the right choice.

SecureAuth Launches Enterprise-Grade Security for Mobile Applications

Enables enterprises to secure access management of mobile applications using SecureAuth two-factor authentication, SSO.

AccelOps Adds Security, Monitoring for Amazon EC2

Integrated SIEM, performance, and availability software extends insight into Microsoft and Oracle databases, adds geo-location reporting.

Enkive Updates Open Source E-mail Archiving, E-discovery Software

Version 1.2 features new statistics engine, archive access via IMAP.

Sepaton Sets 2PB Mark for Single System Storage with Hitachi Storage Arrays

Disk-based backup can protect 2 PB in a single system.

Global IDs Releases Legal Entity Identifier Integration Suite

Designed for rapid deployment inside financial institutions.

Pravail Solution Protects Against Advanced and Insider Threats

New Network Security Intelligence monitors network traffic data, uses advanced analytics to help organizations close the security gaps left by firewalls and intrusion prevention systems.

Q&A: Moving Between Cloud Technologies

Moving from private to public or hybrid clouds can be risky. These best practices can help you avoid common traps.

Q&A: Managing Cloud Downtime

The cloud offers enterprises several economic advantages, but downtime can seriously affect your bottom line. We examine how to prepare for -- and work around -- such service interruptions.

5 Rules for Reining in Key Sprawl

Following these five rules will help your organization get your security keys under control.

Survey Says: Business as Usual for Big Iron

Shops with large mainframe investments tend to double down on Big Iron; small shops, on the other hand, are trying to wean off of them. Call it a case of expansion versus austerity.

New Nuix Solution Simplifies Collection of Large Data Sets

Enterprise Collection Center redefines enterprise collection for eDiscovery and big investigations with powerful workflows to automate the process from collection to production.

BeyondTrust Extends Risk Reduction to Entire IT Operations Team

Retina Community solution expands support for “horizontal IT” for up to 256 IPs at no cost.

Ixia Removes Performance-Robbing Packets from Data Center Networks

Anue Advanced Feature Module 16 cuts network traffic load in half to improve visibility into network, application, and security performance.

Corero’s First Line of Defense Protects against DDoS, Malicious Server Targeted Attacks

New IT infrastructure perimeter solution protects where firewalls cannot.

IBM and AT&T Planning Enterprise Cloud Service for 2013

Service will combine compute and storage infrastructure, new VPN technology.

WatchDox for SharePoint Enables Secure Sharing of Office, PDF Documents

Integrated solution allows secure, leak-free sharing of documents inside and outside the organization and on any mobile device.

HyTrust 3.0 Inhibits Virtual Data Center, Audit Failures

New “secondary approval” feature safeguards companies against costly operational downtime, internal security breaches.

New Tool for Eases SharePoint Migration, Tagging

Enables users to migrate and organize content in SharePoint, Office 365.