Enterprise


8 Best Practices for Encryption Key Management and Data Security

From centralization to support for standards, these encryption key management and data security best practices can help you protect your organization’s confidential data and comply with regulatory mandates.

Vendors Respond to De-Duplication Concerns (Part 3 of 3)

Vendors offer their opinions on staying out of legal hot water to where to expand the use of de-duplication technologies.

Global CEOs Endorse Green IT

Gartner looks at an open letter destined for next year’s G-8 summit

Closing the Loop on SLA Shortcomings

By now, IT and its line-of-business customers should have perfected the art of service level management. The opposite is the case, however.

Securing Your Applications

Firewalls and other technologies no longer adequately protect application code.

Attacks Target Firefox 3.0 Web Browser

Firefox 3.0 release highlights the perils of information technology celebrity

Training IT to Secure Applications

What training do developers need and how do you get executive buy-in?



Careers: IT Hiring Limited to Replacing Employees

Salary growth is flat, and IT hiring is primarily limited to plugging gaps. Shops are cutting back on -- or eliminating -- discretionary spending, too.

A Sanity Check on De-Duplication (Part 2 of 3)

We discuss the types of de-duplication and what meaningful criteria should be used to evaluate competing approaches and products

HP Touts NonStop Perfection

If you're in the market for a non-mainframe mainframe replacement, HP might have just what you need….

File Virtualization Benefits and Best Practices

There’s more to virtualization than just getting the most from your server hardware.

Outsourcers Turn to Multisourcing to Reduce Risk

Outsourcing megadeals appear to be on the decline; does this mean that outsourcing itself is on the way out?

MX Logic Introduces Security Crystal Ball

A security researcher announces a new Threat Forecast service that aims to keep security chiefs at least one step ahead of the bad guys

Analysis: A Closer Look at IBM's Green Software Push

If Green Software is to have an impact, the software industry as a whole needs to get onboard

Network Visibility: The Key to Risk Management

These three steps can help you establish a "reality-based" risk mitigation plan

Improving Data Security with Key Management

How do you ensure that your encryption solutions effectively secure all your sensitive data?

CA Enhances, Expands Mainframe Management Suite

CA touts a visual spin -- in a 3270 interface -- on ESCON and FICON management.

Three Steps to Web Application Safety

With more than 100 million Web applications deployed in the world, perhaps fewer than 5 percent of are being tested for security vulnerabilities. We offer three simple steps to help you secure your Web applications.

Enterprise OS Segment Braces for Upheaval

The enterprise OS-scape could experience disruptive shocks during the next five years

HP Touts Blades Ready for Web 2.0 and Cloud Computing

Putting the cart before the horse: does cloud computing sell, and -- if so -- who's buying?