A little imagination can be a great thing when it comes to planning for a disaster. The disasters we might encounter as IT managers are no different.
How an enterprise’s culture affects its IT security
Best practices for using network and application baselines to help predict service delivery degradations
In a tough economic climate, IT organizations will look to virtualization to reduce TCO, slash their energy costs, and keep up with competitors
If you’re looking to breathe extra life into your fleet of PCs and to keep your network as secure as possible, make sure you’re using a secure Web filter.
Network management is more than just knowing if devices are operating properly.
The next front in the struggle to make IT “greener” will unfold at your fingertips -- on the ubiquitous end-user desktop
To successfully address weaknesses in current e-mail security, IT departments can take six proactive steps now to help their enterprises meet compliance regulations and prevent e-mail misuse.
Here's a simple solution to the disk vs. tape debate: use the technologies together and get the best of both worlds.
If you need to provision, protect, migrate, dedupe, encrypt, replicate, recover, and archive data sources, ODS may be just what you’re looking for.
Resellers should spend more time helping customers to spec out what they want their infrastructure to look like over the next few years.
One of the biggest threats facing your organization is already installed on your desktops: admin rights for end users
We look at the purpose and best use of groups and roles.
Bloated enterprise systems are taking more time and money without providing what organizations really need. Learn how Agile methods can help.
According to Gartner, cloud computing still has some maturing to do
Why now is not the time to cut security budgets.
IT is moving toward total enterprise virtualization, a strategy that proposes to transform both the practice and the purpose of virtualization.
With mergers and acquisitions and the growing need to cut data center costs, data center consolidation is on the minds of many enterprises. We look at the steps IT can take to make for a successful consolidation project.
Chip densities are doubling every 24 months, but a new report says few applications can take advantage of the change.
Security vendors are stepping up their efforts to close the gap between security and operations