Case Studies/Best Practices


Selling IT's Business Value to Management

Why IT must take a lowest common denominator approach to dealing with the suits

Case Studies: SOA in an Age of Legacy Integration

It’s a challenge to bring the mainframe into the modern age of service-oriented architecture but there’s a huge payoff once the job is done.

Case Study: Integrating Mainframe and Web-based Data Entry

Mainframe integration tool improves customer service, productivity, accuracy

Case Study: Implementation Partner Helps Smooth Financial Merger

A financial advisory firm brings in an integration partner to help expand its financial systems

Case Study: SUNY-Buffalo Health Science Schools Aim for Network-Admission Controls

The challenge: securing an infrastructure you don’t control

Case Study: Easier Small-Business Backups

Simple disk-to-disk backup system yields reliable restores

Case Study: Software-as-a-Service Quickly Enables File and Application Sharing

On-demand application suite offers big benefits for a small company



Case Study: HIPAA Concerns Push Network Security Solutions

A federal regulation forced a medical center to lock down privacy, which coincidentally increased savings.

White Paper: CA's Legacy Renewal Solution

Learn how you can retain and extend the value of your mainframe applications

Case Study: Patching the SAFE Federal Credit Union

The need to automate time-consuming, manual patch processes drove one financial institution to adopt patch management software.

Case Study: Wireless Provider's Remote Access Success

Giving mobile users access to enterprise applications and internal portals via an SSL VPN can be tricky. Midwest Wireless' implementation was exceptionally smooth. What's their secret?

Case Study: Outsourcing Threat Detection

With an increasing number of threats and limited IT staff resources, one company turns to outsourcing network monitoring

Case Study: Furthering Role-Based Access

Securing access in the post-mainframe world

Case Study: Polysius Takes Layered Approach to Endpoint Security

The term “endpoint security” includes new types of technology, which makes sense when Polysius’ manager of IT details the myriad, evolving threats to his corporate network, and the company's defenses.

Case Study: Containing Endpoint Infections

How can organizations better contain virus outbreaks and defend against destructive or mass-mailing worms?

Case Study: Choosing Hosted Enterprise IM

A financial firm faces regulations for monitoring and retaining IM communications.

Case Study: Continental Secures Remote Access, Trims Costs

Sometimes the drive for better security can also bring cost savings.

Case Study: A More Resilient Application Infrastructure

Company taps on-demand delivery model to enhance retail management application

Case Study: An IT Infrastructure Overhaul

IBM last week signed a $400 million contract to design a new on-demand IT infrastructure for the University of Pittsburgh Medical Center

Case Study: Bank Audits Vulnerabilities with Security Appliance

Cape Cod Cooperative Bank chooses a dedicated appliance to can its network for vulnerabilities