Enterprise


In Brief

Symantec Antivirus Vulnerability; New Identity Management Acquisitions; NIST Releases HIPAA Security Guide

What's Ahead for Enterprise Anti-Spyware

Performance takes biggest hit from spyware today; look out for spyware working as a phishing aid

ITIL Compliance Supports Corporate Goals, Keeps Systems Running

Use of a standard IT governance model, such as ITIL, gives organizations specific information on how to improve IT disciplines related to service support and delivery.

Trends: Identity and Access Management Needed on Mainframes, Too

Phantom users and orphaned accounts are widespread in the distributed space, but things are even worse in the mainframe world

Q&A: Ascential Acquisition a Boon for Big Blue’s Customers

There’s a good chance many highly specialized capabilities will find their way into DB2, Information Integrator, and other IBM products

Taming Smart Phones

If your phone is so smart, why is it an enterprise security risk?

In Brief

Free Stuff a Security Risk; New Firefox Flaws Surface



Case Study: Bank Audits Vulnerabilities with Security Appliance

Cape Cod Cooperative Bank chooses a dedicated appliance to can its network for vulnerabilities

IBM Walks Fine Line in Competing with Partners

Big Blue must navigate a torturous path as it competes against, and partners with, Compuware, CA, BMC, and other vendors in the mainframe tools space

Q&A: The Software Licensing Lessons Vendors Don’t Want You to Learn

Almost every organization is over-invested in its software assets or paying for software it isn’t using. The trick is finding the how and the where

Careers: Business Growth Fueling Stronger IT Job Market

With hiring is on the upswing, IT professionals once again have clout with potential employers

The Invisibility of Knowledge Work

In the digital world, bringing visibility to the process of knowledge work is the first step in making it more effective

Princeton Softech Goes Beyond Robust Database Archiving

Archive does more than just backup data. On closer inspection, our commentator discovers how it can enhance DB migration, data transfer, consolidation, and even disaster recovery

Lack of Messaging Controls = Regulatory Risk

Mobile phones, lack of policies expose the enterprise

Ignorance of Spyware in the Enterprise Still High

What happens when an organization with spyware problems can’t install anti-spyware software on every system?

In Brief

Criminal intentions behind half of all attacks; mass-mailing worms on the outs

A DBA's Perspective on Managing Change (Part 2 of 2)

The DBA's role in, and challenges of, the change process.

Q&A: Big Iron’s Big Resurgence No Accident

A senior IBMer notes how the company has made the mainframe a more affordable proposition for traditional and non-traditional customers alike

Big Blue Leapfrogs to Head of Data Integration Pack

The Ascential acquisition lets IBM address all of its relational database and information integration shortcomings in one fell swoop.

Sharing Files: Going With What Works

Efficient data sharing that doesn't require disruption to your infrastructure