Why are hardware and database behemoths focusing so much attention on a segment that -- just 18 months ago -- was a relatively sleepy niche?
New research from Aberdeen shows how Best-in-Class companies are getting the most out of unified threat management technologies and services.
Data center managers have their hands full, from compliance costs (including the threat of fines and imprisonment for Sarbanes-Oxley violations) to front-office interference.
Keeping changes under control is vital to keeping business services available.
Why traditional enterprise software is in disarray, and what technology can be of greatest assistance.
Why automated security policy management should be part of IT's overall data security compliance strategy.
If you want to economize on storage for the massive amount of data you're accumulating, the choice is clear: tape.
Choosing a security services provider can be tricky. We explain the key decisions and considerations you must make.
Data centers are mission-critical in today's information-driven business environment, but they've also become overcrowded, overheated, and expensive.
A new survey shows that enterprise networking groups -- not IT security pros -- are usually responsible for day-to-day NAC administration.
Why IT must adopt an information-centric view of security.
Issues that efficiency experts wrestled with decades ago -- chiefly inertia, in the form of internal resistance to people and process changes -- still vex business process optimizers today.
You don't typically think of Big Iron as a locus of Web 2.0 activity -- but IBM is trying to recast it as such
In the new version of CONTROL-M, BMC is trumpeting a job rollback and auditing feature, along with virtualization-friendly amenities
How to handle the special security risks posed by portable devices
System complexity is burdening systems managers. We look at the landscape.
A new survey finds that nearly 9 out of 10 IT employees say they'd steal privileged or confidential information if they knew they were going to be laid-off tomorrow.
Results of AberdeenGroup research shed light on best practices in vulnerability management
Five steps in a unique process that visionary CIOs can use to meet their company’s strategic goals
How to protect yourself from the threats posed by unified communications.