Case Studies/Best Practices


Bigger is Better in Newest Database Niche

Why are hardware and database behemoths focusing so much attention on a segment that -- just 18 months ago -- was a relatively sleepy niche?

Getting the Most from Your UTM

New research from Aberdeen shows how Best-in-Class companies are getting the most out of unified threat management technologies and services.

Data Center Under the Gun: Welcome to the Party

Data center managers have their hands full, from compliance costs (including the threat of fines and imprisonment for Sarbanes-Oxley violations) to front-office interference.

Q&A: Change Management Challenges

Keeping changes under control is vital to keeping business services available.

Getting Application Development Back on Track with SaaS

Why traditional enterprise software is in disarray, and what technology can be of greatest assistance.

Managing Security Compliance from the Inside Out

Why automated security policy management should be part of IT's overall data security compliance strategy.

Tape is Key to Containing IT Spending

If you want to economize on storage for the massive amount of data you're accumulating, the choice is clear: tape.



Top Tips for Picking a Managed Security Services Provider

Choosing a security services provider can be tricky. We explain the key decisions and considerations you must make.

Optimizing Your Data Center

Data centers are mission-critical in today's information-driven business environment, but they've also become overcrowded, overheated, and expensive.

Survey Sheds Light on Use, Maintenance of Network Access Control

A new survey shows that enterprise networking groups -- not IT security pros -- are usually responsible for day-to-day NAC administration.

Q&A: Taming Data Breaches

Why IT must adopt an information-centric view of security.

Profile: The Original Business Process Optimizer

Issues that efficiency experts wrestled with decades ago -- chiefly inertia, in the form of internal resistance to people and process changes -- still vex business process optimizers today.

Get Ready to Web 2.0-ify Your Mainframe

You don't typically think of Big Iron as a locus of Web 2.0 activity -- but IBM is trying to recast it as such

BMC Announces "Significant" Overhaul of Job Scheduler

In the new version of CONTROL-M, BMC is trumpeting a job rollback and auditing feature, along with virtualization-friendly amenities

Q&A: Securing Mobile Devices

How to handle the special security risks posed by portable devices

Q&A: VM Evolution and Systems Management

System complexity is burdening systems managers. We look at the landscape.

Disgruntled Employees Pose Large Inside Threat

A new survey finds that nearly 9 out of 10 IT employees say they'd steal privileged or confidential information if they knew they were going to be laid-off tomorrow.

Vulnerability Management: Assess, Prioritize, Remediate, Repeat

Results of AberdeenGroup research shed light on best practices in vulnerability management

Best Practices in IT Governance

Five steps in a unique process that visionary CIOs can use to meet their company’s strategic goals

Mitigating the Security Risks of Unified Communications

How to protect yourself from the threats posed by unified communications.