Enterprise


Storage Security in a Box? (Part III in a Series)

Placing storage security in the network is another option for locking down your data

Maintaining Up-time in an Ever-Changing Environment

A new survey sheds light on the high cost of downtime, and reveals how IT departments are struggling to manage complex environments

Securing Business File Transfers

Despite the security weaknesses of FTP, there are several approaches IT can take to use the protocol safely.

If Green IT Sells, Who’s Buying?

A consortium of computing heavyweights gathered together last week to help keep the Green IT bandwagon going

Data Breach Kit: Five Steps to Help You Survive the Inevitable

Fact: Information systems are porous. Most companies will, despite their best efforts, allow some level of data exposure during the next year. Are you ready? Learn the tools and processes you need in place now to control data-breach damage, perform digital forensics, and gather the evidence required to recover and reduce risk.

IBM, Sun Prove Why Grid Computing is Alive and Well

Successful grid services from both IBM and Sun Microsystems offer proof that grid computing is alive and well in the enterprise

True Identity Management: Watch the Gamblers

To learn about good IT security management practices for your enterprise, take a lesson from a casino.



IT Security: Lessons of a Thirty-Year Career

IT security has changed in the last 30 years; we look back and explore what IT must do now to get a better grip on the environment.

Podcast: Managing Data Center Complexity

What are IT departments doing to address the growing complexity of their data centers? We examine the results of a recent survey and explore the trends.

Big Iron Big in Brazil

Brazil invests nearly one-third of its total IT spending in mainframe systems

A Seuss-ian View of Storage Security

One of the big puzzles of storage security is how best, architecturally speaking, to deploy the technology. BitArmor answers our questions.

Database Auditing Gets Serious

Why database-auditing software is critical to protecting your company’s assets

CA: Back in the Saddle Again

With SEC matters behind it and new management at the helm, CA seems leaner, unencumbered, and ready to compete full-force.

Embracing Microsoft Vista for Enhanced Network Security

Effective implementation of server and domain isolation requires complete network visibility throughout the OS migration process

Is IBM’s Green IT Push Missing the Point?

Though the mainframe may be cheaper to power and cool, it’s software is significantly more expensive

Server Core: Small Footprint, Big Security

A smaller footprint may reduce security risks in Windows Server 2008

Podcast: SOA Development Challenges

What’s driving SOA’s adoption and how is developing for the technology different from traditional development?

Challenges in the Age of Encryption

IT management will face challenges unless it lays the groundwork for the growing ubiquity of encryption

New ITIL V3 Shifts from Processes to Service Lifecycle

The updated ITIL framework reinforces the importance of a service lifecycle and emphasizes a business-driven, top-down approach and IT/business integration.

Microsoft on the IP Warpath?

Gartner thinks Microsoft isn’t so much attempting to stifle open-source innovation—although that’s one possible upside—as it is to generate more cash flow