Case Studies/Best Practices


Q&A: Preventing Mobile Vulnerabilities

Best practices for keeping mobile devices safe.

Q&A: Wi-Fi Drives VPN Adoption at Swiss Insurer

Getting and staying connected was key to this Swiss insurance company, but Wi-Fi access meant it had to find a VPN solution.

Avoiding Buffet-Style Overindulgence in Your Internal Cloud

Although clouds may never provide a truly carefree lifestyle when it comes to resources, these steps can ensure that they don’t create an expensive operational nightmare.

Q&A: How to Successfully Migrate Legacy Data

Updating applications with current technology means IT must make sure no data is left behind.

Q&A: Best Practices for Enterprise-Scale Identity and Access Management Systems

What is IAM and how can you make an IAM project a success?

5 Best Practices for Reducing IT Complexity

Can your business users trust your IT department? A new approach to enterprise automation may help IT better manage IT complexity and enhance that user/IT trust.

Q&A: Best Practices for Working with Unstructured Data

What is unstructured data and how should IT search on and store it?



5 Tips for Choosing a Managed Service Provider for Your Multivendor Environment

Managed services help enterprises enjoy the benefits of best-of-breed equipment when deploying converged communications.

Q&A: Benefits and Best Practices of Application Performance Management

What is application performance management, how can it reduce the number of availability incidents, and what best practices can help ensure your APM initiative is a success?

Can Your Data Storage Process Stand Up in Court?

Why you need a defensible data retention and collection process.

Overcoming Security Pains in UNIX Environments

Getting a handle on UNIX vulnerabilities is no easy task.

Mitigating the Limits of Your Data Center

To help data center managers understand how best to employ new energy metrics and tools, we examine five ways to optimize use of available space, cooling capacity, and power.

Q&A: Enterprise Collaboration and the Role of Private Social Networks

How enterprise social collaboration can benefit the enterprise.

How to Mitigate Smartphone Threats to Your Corporate Network

These tips can help you minimize mobile threats.

Q&A: Best Practices for SLAs

Are SLAs still useful, and can metrics really measure what's important?

Five Steps to a Continuously Compliant Data Center (Part 2 of 2)

These five steps provide a road map for continuous compliance in the data center.

Last Call for IPv4

It's time to start planning your transition to IPv6.

Blade Server Demand Driving High-Density Zones

High-density zones strike a balance between the power and cooling requirements of different kinds of data center assets. The rub, of course, is that they'll cost you.

5 Steps to a Continuously Compliant Data Center (Part 1 of 2)

These five steps provide a road map for continuous compliance in the data center.

Making Your Data Center Energy Efficient, One PUE at a Time

After all, if your company doesn't know what data center components waste energy, how can you change it?