Case Studies/Best Practices


Best Practices for Data Governance in SharePoint Environments

As awareness of SharePoint access control complexity grows, organizations are are focusing on security and compliance for their SharePoint deployments. We offer best practices to address these concerns.

Choosing the Right Protocol Analyzer

Why hardware-based protocol analyzers are worth the extra cost and are superior to those based in software.

Five Virtualization Best Practices That Can Transform Enterprise IT

To help you meet the challenges of virtualization, we offer five best practices that will transform enterprise IT both operationally and strategically.

Three Top Tips for Successful Business Continuity Planning

Building a business continuity plan is an ongoing job, but mature technologies exist that meet the range of key requirements.

Best Practices for Selecting and Managing Enterprise Application Appliances

Three features that should guide your choice of an application appliance.

Challenges and Opportunities Facing Today’s Data Center

The job of doing more with less can be divided into two distinct but related tasks: achieving IT efficiency and maximizing existing resources.

Q&A: Keeping Networks Simple Brings Big Rewards

The key to smart IT spending just may be investments that simplify your network infrastructure.



Secure File Transfers: P2P Alternatives

P2P file sharing is on the rise, and so are its risks. We show you five tips that can help you select a secure enterprise file-transfer solution.

New Threats Unite Security and Systems Management Professionals

To effectively address new security challenges, IT organizations need to tighten coordination and integration between security.

Q&A: Maximizing System Uptime

How to avoid the top mistakes when managing uptime performance, and how you can maximize system availability.

Data Security Trends: Staying Ahead of the Bad Guys

What you can do now to stay a step ahead of the changing vulnerability landscape.

Securing a Network’s Print Data Stream with TLS/SSL Encryption

Awareness that a thorough security policy should include measures for secure network printing is rising slowly but surely.

Q&A: The Drive to Unified Information Access

Imagine querying all enterprise information with the precision of SQL and the fuzziness of search. That’s the promise of unified information access.

MySQL Tuning Best Practices

Detailed tips and tricks for getting the most out of MySQL in the enterprise

Virtualization Benefits: Beyond Server Consolidation

Virtualization has provided economic benefits, but there are more benefits to be had.

Q&A: Preventing Data Loss

A closer look at the components and best practices for success with your data loss prevention project.

Stephen Swoyer

Why Web Attacks Are Rising

A new report shines light on Web-based attacks, concluding that -- in terms of both volume and variety -- they pose a significant, and significantly expanding, threat.

Tape’s Role in the Green Data Center

Long-standing technology is surprisingly efficient when it comes to “going green” with storage.

Stephen Swoyer

Spammers Exploiting the Recession

Spammers are tweaking their messaging to better exploit recession-related fear, uncertainty, and doubt