Case Studies/Best Practices


Choosing the Right Protocol Analyzer

Why hardware-based protocol analyzers are worth the extra cost and are superior to those based in software.

Q&A: Squeezing More Out of Your IT Environment

Where should IT start when trying to do more within new (and tight) budget constraints?

Five Virtualization Best Practices That Can Transform Enterprise IT

To help you meet the challenges of virtualization, we offer five best practices that will transform enterprise IT both operationally and strategically.

Three Top Tips for Successful Business Continuity Planning

Building a business continuity plan is an ongoing job, but mature technologies exist that meet the range of key requirements.

Best Practices for Selecting and Managing Enterprise Application Appliances

Three features that should guide your choice of an application appliance.

Challenges and Opportunities Facing Today’s Data Center

The job of doing more with less can be divided into two distinct but related tasks: achieving IT efficiency and maximizing existing resources.

Q&A: Keeping Networks Simple Brings Big Rewards

The key to smart IT spending just may be investments that simplify your network infrastructure.



Secure File Transfers: P2P Alternatives

P2P file sharing is on the rise, and so are its risks. We show you five tips that can help you select a secure enterprise file-transfer solution.

New Threats Unite Security and Systems Management Professionals

To effectively address new security challenges, IT organizations need to tighten coordination and integration between security.

Q&A: Maximizing System Uptime

How to avoid the top mistakes when managing uptime performance, and how you can maximize system availability.

Securing a Network’s Print Data Stream with TLS/SSL Encryption

Awareness that a thorough security policy should include measures for secure network printing is rising slowly but surely.

Q&A: The Drive to Unified Information Access

Imagine querying all enterprise information with the precision of SQL and the fuzziness of search. That’s the promise of unified information access.

Data Security Trends: Staying Ahead of the Bad Guys

What you can do now to stay a step ahead of the changing vulnerability landscape.

MySQL Tuning Best Practices

Detailed tips and tricks for getting the most out of MySQL in the enterprise

Virtualization Benefits: Beyond Server Consolidation

Virtualization has provided economic benefits, but there are more benefits to be had.

Stephen Swoyer

Why Web Attacks Are Rising

A new report shines light on Web-based attacks, concluding that -- in terms of both volume and variety -- they pose a significant, and significantly expanding, threat.

Q&A: Preventing Data Loss

A closer look at the components and best practices for success with your data loss prevention project.

Tape’s Role in the Green Data Center

Long-standing technology is surprisingly efficient when it comes to “going green” with storage.

Stephen Swoyer

Spammers Exploiting the Recession

Spammers are tweaking their messaging to better exploit recession-related fear, uncertainty, and doubt