Enterprise


Q&A: How BeyondTrust Addresses Windows Security

How should IT pros control user access in a Microsoft environment?

Q&A: Maximizing Network Performance

Network management is more than just knowing if devices are operating properly.

Gartner Estimates Energy Savings from PC Power Management

The next front in the struggle to make IT “greener” will unfold at your fingertips -- on the ubiquitous end-user desktop

Fostering a Culture of Compliance: Six Steps to E-Mail Security

To successfully address weaknesses in current e-mail security, IT departments can take six proactive steps now to help their enterprises meet compliance regulations and prevent e-mail misuse.

In the Tape vs. Disk War, Think Tape AND Disk

Here's a simple solution to the disk vs. tape debate: use the technologies together and get the best of both worlds.

Q&A: The Optimized Data Services Model

If you need to provision, protect, migrate, dedupe, encrypt, replicate, recover, and archive data sources, ODS may be just what you’re looking for.

Jon Toigo

Speaking Plainly about Purpose-Built Storage

Resellers should spend more time helping customers to spec out what they want their infrastructure to look like over the next few years.



Removing Admin Rights Dramatically Cuts Vulnerabilities, Study Finds

One of the biggest threats facing your organization is already installed on your desktops: admin rights for end users

Q&A: Best Practices for Access Management

We look at the purpose and best use of groups and roles.

Careers: IT Still Plans to Spend Despite Salary Cuts

Along with IT pay cuts, there's a bona-fide IT spending counter-trend, analysts say, but who will benefit?

Agile and the Fine Art of Gathering Application Requirements

Bloated enterprise systems are taking more time and money without providing what organizations really need. Learn how Agile methods can help.

Computing in the Clouds: Enterprise-Ready by 2015

According to Gartner, cloud computing still has some maturing to do

Standing Firm on Security Spending

Why now is not the time to cut security budgets.

Avoiding Downtime in Virtualized Environments

Virtualization can create single points of failure. We show you how to protect yourself.

SHARE Survey Sheds Light on Virtual Trends

IT is moving toward total enterprise virtualization, a strategy that proposes to transform both the practice and the purpose of virtualization.

Q&A: Data Center Consolidation Best Practices

With mergers and acquisitions and the growing need to cut data center costs, data center consolidation is on the minds of many enterprises. We look at the steps IT can take to make for a successful consolidation project.

When Storage Management Vendors Collide

A quick rebuttal to a competitor's press release piques interest in vendor claims.

Multi-Core Enterprise Computing: A Ferrari Engine in a Go-Cart

Chip densities are doubling every 24 months, but a new report says few applications can take advantage of the change.

Minding the Gap: Security Vendors Look to Plug Holes in Suite Offerings

Security vendors are stepping up their efforts to close the gap between security and operations

Value-Add Software: The Risks for Storage Managers

Storage buyers have been conditioned to look for ever-greater "value." We explain why this behavior is so risky.