Enterprise


Access Control: 10 Best Practices

Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.

Access Control: 10 Best Practices

Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.

The Role of the Enterprise Architect

The enterprise architect wears a multitude of hats to perform a very demanding job.

Why NAC Alone Is Not Enough

While a NAC solution blocks infected endpoints from entering the network, what happens when a connected PC becomes non-compliant?

Subcontinental Power Play: IBM Pushes System z in India

Is what's good for IBM's System z sales efforts always good for independent mainframe technologists?

Access Control: 10 Best Practices

Properly implemented, access controls only give employees access to the applications and databases they need to do their jobs. At many regulated organizations, such controls are too often manual, outdated, and largely ineffective. Here's how to overhaul your access control program.

The SOA Frontier: CA Troubleshoots Application Performance Problems

CA pushes Wily SOA Manager as a good prescription for treating application performance issues in SOA environments.



DB2 9 for z/OS Goes GA

IBM hopes that DB2 9’s performance, manageability, and security enhancements will make it a must-upgrade release

All Agog Over Data Warehousing

IBM last week made a pair of notable moves on the business intelligence front

Just NBOD It

How much would you spend for 2 TB?

IT Dangerously Unprepared for E-Discovery, Survey Shows

A new survey from Fortiva shows the extent that IT is unprepared for e-discovery regulations

Configuration Management: Ecora Auditor Pro and Tripwire Enterprise

Compliance is often a matter of managing change

Getting the Real Data about Your Data

SRM is probably the most important investment that storage managers can make, but it’s riddled with problems.

Podcast: Data Center Management Challenges

We sort out the complex range of data center challenges, from compliance issues to new technologies to securing remote users and suggest ways to make the DC manager’s life easier.

Cutting IT Costs with IBM’s MSU Software Licensing

In practice, for some mainframe customers, Big Blue’s MSU technology dividend really does translate into significant cost savings.

The Internal Security Mindset: Getting Your Head in the Game

IT is still largely unprotected from one area of enterprise risk: the insider threat.

The Verdict on Vista Security: A Mixed Bag

Symantec Corp.’s Advanced Threat Research team reports that Windows Vista does deliver tangible security improvements—but Vista is still far from invulnerable.

Big Blue Still Sitting Pretty Atop Server Market Heap

IBM Corp. is server market king—thanks to the strong performance of Big Blue’s System x, System p, and System z platforms

Hosting E-Mail in a Storage Cluster

The need to build resilient low-cost infrastructure for hosting e-mail archives is growing fast.