In the second of three parts, unifying security, compliance, and risk assessment get better results
In this first part of a three-part series, we look at how compliance continues to change IT security and response to risk
While industry watchers once encouraged customers to think about transitioning away from pre-relational DMBSes, they’re now backtracking
A vendor’s "greenness" matters to IT executives says research firm IDC
You don’t have to rewrite or rip-and-replace you legacy apps to make them more useful.
Lexicon-based and random reviews address only part of the need to internally monitor e-mail. We explain how, to be complete, a message's context must be examined.
Storage purchasing with an eye toward promised "treats" may ignore the "tricks" that follow.
A patent infringement case may be just the impetus IT needs to initiate data management projects.
Information Server seems tailor-made for Big Blue’s bring-it-all-back-home to System z philosophy -- particularly with respect to data processing workloads.
A new Aberdeen study offers guidance for executives and business managers to get the most out of key performance indicators when making decisions.
In the second article in our two-part series, we explain why adopting the IT Information Library may not be right for your organization.
Next version of z/VSE looks like an operating system reborn
Can products such as Lancope’s Stealthflow spot security problems and network bottlenecks?
Security information and event management (SIEM) can help administrators track security data in a networked environment and counter potential threats.
Let innovation happen with Web 2.0 applications and software-as-a-service delivery, Gartner advises.
There’s gold in eco-friendly IT, industry watchers argue, and -- more than meets the eye -- the mainframe has a big Green IT story to tell.
The mid-size enterprise needs simple, fast, reliable, and secure ways to transfer large files. PDP and UDP technologies may provide the answer.
We can’t expect vendors to solve all our problems. Sometimes we have to do the heavy lifting ourselves.
In the first article in our two-part series, we look at the promised benefits of adopting the IT Information Library in your organization.
Fines and fees are looming after the September 30 PCI compliance deadline. Still, less than half of merchants report full compliance with PCI security requirements, and encryption failures contribute to four out of five failed PCI audits. Why can't companies get encryption right? Here are five key steps for overcoming encryption hurdles.