For sensitive data sitting on a portable, encryption is no longer an option. It’s a necessity.
Enterprises once considered using a third-party to manage their off-site data on the basis of cost. The economics have shifted.
Famous British hospital moves to integrated backup, e-mail archive system
Options for notification and remediation, as well as NAC integration techniques and technologies.
New SHARE president Martin Timmerman says he has ambitious plans for the world’s oldest mainframe user group
In the second part of our three-part series about network access/admission control, we examine considerations when testing the health of endpoint devices
SANs are out, virtual grids (aka storage clusters) are in.
There’s gold in the SMB market, and IBM officials say they’ve made real gains in the lucrative space
UTMs are effective for the perimeter, but when it comes to remote offices, don’t shirk the rest of your security needs.
From zero-hour protection to safeguarding mobile devices, we explore what security functions you can outsource and the characteristics of companies that do so
Why a nearline component solution is the most practical and cost-effective way to keep data warehouse storage costs under control.
More unstructured data and an emphasis on business intelligence will keep DBAs busy
Merging IT and physical security can bring some exciting synergies to an enterprise.
After a quarter like System z just had, it’s difficult to see how or why competitors are still writing epitaphs for Big Iron
It’s all-but-official: electrical power consumption is a big issue today and will be an even bigger issue tomorrow.
Increasingly, hackers have infiltrated "protected" enterprise networks. One NAC provider says the key to maximizing your protection is to know what’s on your network.
In the first part of our three-part series about network access/admission control, we examine key technologies and issues so you can choose the right NAC solution for your network.
Feedback on our column about clustering inefficiency.
Late last month, Big Blue gave pundits a glimpse at Power 6, the next-generation RISC CMOS it expects to unveil next year
Driven by regulations and internal compliance issues, searching and retrieving old e-mail stores is a challenge. Stronger search tools can help lessen the pain.