How should IT pros control user access in a Microsoft environment?
Network management is more than just knowing if devices are operating properly.
The next front in the struggle to make IT “greener” will unfold at your fingertips -- on the ubiquitous end-user desktop
To successfully address weaknesses in current e-mail security, IT departments can take six proactive steps now to help their enterprises meet compliance regulations and prevent e-mail misuse.
Here's a simple solution to the disk vs. tape debate: use the technologies together and get the best of both worlds.
If you need to provision, protect, migrate, dedupe, encrypt, replicate, recover, and archive data sources, ODS may be just what you’re looking for.
Resellers should spend more time helping customers to spec out what they want their infrastructure to look like over the next few years.
One of the biggest threats facing your organization is already installed on your desktops: admin rights for end users
We look at the purpose and best use of groups and roles.
Along with IT pay cuts, there's a bona-fide IT spending counter-trend, analysts say, but who will benefit?
Bloated enterprise systems are taking more time and money without providing what organizations really need. Learn how Agile methods can help.
According to Gartner, cloud computing still has some maturing to do
Why now is not the time to cut security budgets.
Virtualization can create single points of failure. We show you how to protect yourself.
IT is moving toward total enterprise virtualization, a strategy that proposes to transform both the practice and the purpose of virtualization.
With mergers and acquisitions and the growing need to cut data center costs, data center consolidation is on the minds of many enterprises. We look at the steps IT can take to make for a successful consolidation project.
A quick rebuttal to a competitor's press release piques interest in vendor claims.
Chip densities are doubling every 24 months, but a new report says few applications can take advantage of the change.
Security vendors are stepping up their efforts to close the gap between security and operations
Storage buyers have been conditioned to look for ever-greater "value." We explain why this behavior is so risky.