A recent study shows what makes the difference between high-performing organizations and those that struggle.
Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.
Is what's good for IBM's System z sales efforts always good for independent mainframe technologists?
While a NAC solution blocks infected endpoints from entering the network, what happens when a connected PC becomes non-compliant?
Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.
Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.
CA pushes Wily SOA Manager as a good prescription for treating application performance issues in SOA environments.
How much would you spend for 2 TB?
A new survey from Fortiva shows the extent that IT is unprepared for e-discovery regulations
Compliance is often a matter of managing change
IBM hopes that DB2 9’s performance, manageability, and security enhancements will make it a must-upgrade release
IBM last week made a pair of notable moves on the business intelligence front
Symantec Corp.’s Advanced Threat Research team reports that Windows Vista does deliver tangible security improvements—but Vista is still far from invulnerable.
SRM is probably the most important investment that storage managers can make, but it’s riddled with problems.
We sort out the complex range of data center challenges, from compliance issues to new technologies to securing remote users and suggest ways to make the DC manager’s life easier.
In practice, for some mainframe customers, Big Blue’s MSU technology dividend really does translate into significant cost savings.
IT is still largely unprotected from one area of enterprise risk: the insider threat.
The need to build resilient low-cost infrastructure for hosting e-mail archives is growing fast.
Two strategies and a dozen tips help you improve your user’s NAC