Case Studies/Best Practices


Imagining Disaster Recovery

A little imagination can be a great thing when it comes to planning for a disaster. The disasters we might encounter as IT managers are no different.

Q&A: Security Breaches and Enterprise Culture

How an enterprise’s culture affects its IT security

Service Delivery: You Can't Manage What You Can't See

Best practices for using network and application baselines to help predict service delivery degradations

Everything's Coming up Virtual

In a tough economic climate, IT organizations will look to virtualization to reduce TCO, slash their energy costs, and keep up with competitors

Beyond AV Protection with Web Filtering

If you’re looking to breathe extra life into your fleet of PCs and to keep your network as secure as possible, make sure you’re using a secure Web filter.

Q&A: Maximizing Network Performance

Network management is more than just knowing if devices are operating properly.

Gartner Estimates Energy Savings from PC Power Management

The next front in the struggle to make IT “greener” will unfold at your fingertips -- on the ubiquitous end-user desktop



Fostering a Culture of Compliance: Six Steps to E-Mail Security

To successfully address weaknesses in current e-mail security, IT departments can take six proactive steps now to help their enterprises meet compliance regulations and prevent e-mail misuse.

In the Tape vs. Disk War, Think Tape AND Disk

Here's a simple solution to the disk vs. tape debate: use the technologies together and get the best of both worlds.

Q&A: The Optimized Data Services Model

If you need to provision, protect, migrate, dedupe, encrypt, replicate, recover, and archive data sources, ODS may be just what you’re looking for.

Jon Toigo

Speaking Plainly about Purpose-Built Storage

Resellers should spend more time helping customers to spec out what they want their infrastructure to look like over the next few years.

Removing Admin Rights Dramatically Cuts Vulnerabilities, Study Finds

One of the biggest threats facing your organization is already installed on your desktops: admin rights for end users

Q&A: Best Practices for Access Management

We look at the purpose and best use of groups and roles.

Agile and the Fine Art of Gathering Application Requirements

Bloated enterprise systems are taking more time and money without providing what organizations really need. Learn how Agile methods can help.

Computing in the Clouds: Enterprise-Ready by 2015

According to Gartner, cloud computing still has some maturing to do

Standing Firm on Security Spending

Why now is not the time to cut security budgets.

SHARE Survey Sheds Light on Virtual Trends

IT is moving toward total enterprise virtualization, a strategy that proposes to transform both the practice and the purpose of virtualization.

Q&A: Data Center Consolidation Best Practices

With mergers and acquisitions and the growing need to cut data center costs, data center consolidation is on the minds of many enterprises. We look at the steps IT can take to make for a successful consolidation project.

Multi-Core Enterprise Computing: A Ferrari Engine in a Go-Cart

Chip densities are doubling every 24 months, but a new report says few applications can take advantage of the change.

Minding the Gap: Security Vendors Look to Plug Holes in Suite Offerings

Security vendors are stepping up their efforts to close the gap between security and operations