Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.
Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.
The enterprise architect wears a multitude of hats to perform a very demanding job.
While a NAC solution blocks infected endpoints from entering the network, what happens when a connected PC becomes non-compliant?
Is what's good for IBM's System z sales efforts always good for independent mainframe technologists?
Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.
CA pushes Wily SOA Manager as a good prescription for treating application performance issues in SOA environments.
IBM hopes that DB2 9’s performance, manageability, and security enhancements will make it a must-upgrade release
IBM last week made a pair of notable moves on the business intelligence front
How much would you spend for 2 TB?
A new survey from Fortiva shows the extent that IT is unprepared for e-discovery regulations
Compliance is often a matter of managing change
SRM is probably the most important investment that storage managers can make, but it’s riddled with problems.
We sort out the complex range of data center challenges, from compliance issues to new technologies to securing remote users and suggest ways to make the DC manager’s life easier.
In practice, for some mainframe customers, Big Blue’s MSU technology dividend really does translate into significant cost savings.
IT is still largely unprotected from one area of enterprise risk: the insider threat.
Symantec Corp.’s Advanced Threat Research team reports that Windows Vista does deliver tangible security improvements—but Vista is still far from invulnerable.
IBM Corp. is server market king—thanks to the strong performance of Big Blue’s System x, System p, and System z platforms
The need to build resilient low-cost infrastructure for hosting e-mail archives is growing fast.