Enterprise


Storms on the Horizon: Examining Your Continuity Plans

Continuity planning has significant value to offer besides risk reduction; sadly, the benefits are rarely talked about.

Best Practices for Data Governance in SharePoint Environments

As awareness of SharePoint access control complexity grows, organizations are are focusing on security and compliance for their SharePoint deployments. We offer best practices to address these concerns.

Choosing the Right Protocol Analyzer

Why hardware-based protocol analyzers are worth the extra cost and are superior to those based in software.

Fortify, HP Tout Integrated Approach to Application Vulnerability Testing

Experts say a recent accord between Fortify and HP augurs the advent of a new approach to vulnerability detection.

Q&A: Squeezing More Out of Your IT Environment

Where should IT start when trying to do more within new (and tight) budget constraints?

Q&A: Inside Business Service Management

IT spending is under the microscope. How do you know you’re making the best investment decisions for network and server infrastructure? Business service management may be the answer IT and business users need.

Stephen Swoyer

Spam Levels Continue to Surge, MessageLabs Reports

Spam levels surged in May, but technologies such as traffic and connection management helped reduce or rein-in the volume of malicious traffic.



Business Executives Don't Tie Disaster Recovery Efforts to Business Success, Study Reveals

There's a significant disconnect between IT and business executives when it comes to disaster recovery preparedness.

Stephen Swoyer

IT Budget Strategies: Doing More with Less

How IT can continue to offer the same (or similar) levels of service on severely restricted budgets?

Q&A: Administrator Rights and Enhanced Security

Administrator rights let users do everything on a system, but these rights are also the target of malware and other vulnerabilities.

Stephen Swoyer

Big Iron in the Clouds, Revisited

The mainframe already embodies a viable proof-of-concept for cloud computing in the enterprise. Is it a cloud platform par excellence?

Three Top Tips for Successful Business Continuity Planning

Building a business continuity plan is an ongoing job, but mature technologies exist that meet the range of key requirements.

Q&A: Harnessing Computing Power for Data Analysis with MapReduce

MapReduce can help spread the computational chores between many computers. But what if the technology could be unleashed for all data, not just file-based data processing?

Q&A: Internet Threats and Web Filters in the Cloud

Threats delivered through the Web are increasing in number and severity. A Web filtering solution can reduce an enterprise’s vulnerability.

Stephen Swoyer

The Mainframe Security Paradox

Mainframe operators know which controls to implement, but auditors -- who frequently come from the distributed side of the divide -- don’t.

Overcoming Security Objections to a Virtual Infrastructure

Proper planning that includes addressing security will help you reap the benefits of virtualization and satisfy those who ensure business continuity and protect corporate data.

Stephen Swoyer

Enterprises Throw Out Wi-Fi Welcome Mat to Attackers, Study Finds

A recent report by AirTight Networks finds financial services firms are all but throwing out a welcome mat to wireless attacker

Secure File Transfers: P2P Alternatives

P2P file sharing is on the rise, and so are its risks. We show you five tips that can help you select a secure enterprise file-transfer solution.

New Threats Unite Security and Systems Management Professionals

To effectively address new security challenges, IT organizations need to tighten coordination and integration between security.

Q&A: Maximizing System Uptime

How to avoid the top mistakes when managing uptime performance, and how you can maximize system availability.