Enterprise


In Brief

Forrester pushes personal firewalls, virus writers join forces, Windows rootkits circulate, Symantec sees kid sites awash in adware

Tips for CSOs: How to Discuss Security Issues with Executives

Many CSOs still have difficulty communicating security requirements to their more business-oriented peers.

Q&A: Endpoint Security for Unknown Devices

How can IT managers secure endpoints over which they have no control?

Workloads Return Home to the Mainframe

Workloads are coming back to the mainframe, as BI powerhouse Informatica demonstrated last month

Opsware: Taking the Pain Out of Network Management

Opsware brings its automation-centric focus to network management

A DBA's Perspective on Managing Change (Part 1 of 2)

We examine the integration of database change management into a BSM strategy, plus the critical role of asset, configuration, and change management solutions in achieving BSM

About the Big Merger: VERITAS Responds

Is there anything left but spin in the storage management solution department?



Q&A: Security Policy Best Practices

Communication and monitoring are key, but policies must evolve with changing regulations and new technologies

Social Engineering Bypasses Information Security Controls

Identity theft draws media attention; phishing attacks skyrocket

In Brief

Automating E-Mail Retention, Industry Forms VoIP Security Alliance

Q&A: Opsware’s Utility-Computing Trump Card

Even though HP, IBM, and Sun have monopolized the utility-computing limelight, Opsware believes it has a trump card up its sleeve

Case Study: Rescuing a Hospital Drowning in Paper

How one hospital tapped DB2 Content Manager to drastically reduce its paper and printing costs—and realized other savings to boot

ETL Increasingly Used Outside Data Warehouses

ETL isn’t a data warehousing-only play—companies are increasingly tapping it to support database consolidations and migrations, among other tasks

A Swiss Army Knife for Project Management

One deliverable, two tools, and three rules form the essential Swiss Army knife of effective project management.

A Storage Software User’s Song: Should I Stay or Should I Go?

How many pieces does it take to build a storage management solution?

Best Practices in VoIP Security

Don't forget to secure your VoIP network

In Brief

Resistance, then acceptance of automated e-mail retention; reports of spam’s decline premature

Corporate Security Awareness Grows but Funding Lags

Survey shows security managers still face budget battle

Passionate Support of Users Keeps Legacy Platforms Alive

“Legacy” platforms like OpenVMS and NonStop keep on keeping on, thanks in large part to the passionate support of their users

Cisco’s Aggressive Security Push

A raft of new security enhancements helps bring Cisco to feature parity with other vendors—but the networking giant isn’t yet a security innovator