Enterprise


Data Encryption: The Whole-Disk Option

For sensitive data sitting on a portable, encryption is no longer an option. It’s a necessity.

Outsourcing Storage: This Time it’s about Compliance

Enterprises once considered using a third-party to manage their off-site data on the basis of cost. The economics have shifted.

Case Study: Centuries-old Hospital Adopts State-of-the-Art Backup and Archiving System

Famous British hospital moves to integrated backup, e-mail archive system

NAC: Remediation and Integration

Options for notification and remediation, as well as NAC integration techniques and technologies.

SHARE to Spearhead Mainframe’s Future

New SHARE president Martin Timmerman says he has ambitious plans for the world’s oldest mainframe user group

NAC Testing Options: Validating Endpoints and Their Health

In the second part of our three-part series about network access/admission control, we examine considerations when testing the health of endpoint devices

A Closer Look: Network Appliance Clustering, Part 2

SANs are out, virtual grids (aka storage clusters) are in.



IBM Has Its Eyes on the SMB Prize

There’s gold in the SMB market, and IBM officials say they’ve made real gains in the lucrative space

Unified Threat Management: Think Beyond Appliances

UTMs are effective for the perimeter, but when it comes to remote offices, don’t shirk the rest of your security needs.

Podcast: Outsourcing Security

From zero-hour protection to safeguarding mobile devices, we explore what security functions you can outsource and the characteristics of companies that do so

Nearline Solutions: Reducing Data Storage Infrastructure Costs

Why a nearline component solution is the most practical and cost-effective way to keep data warehouse storage costs under control.

Data Trends Foreshadow DBA Challenges, MS SQL Server Direction

More unstructured data and an emphasis on business intelligence will keep DBAs busy

Podcast: Security Synergy

Merging IT and physical security can bring some exciting synergies to an enterprise.

Sales Leap Defies Anti-Mainframe Campaign

After a quarter like System z just had, it’s difficult to see how or why competitors are still writing epitaphs for Big Iron

The Greening of IT: Cutting Power Consumption is Just the Beginning

It’s all-but-official: electrical power consumption is a big issue today and will be an even bigger issue tomorrow.

Foiling Hackers with NAC: First, Know What You Have

Increasingly, hackers have infiltrated "protected" enterprise networks. One NAC provider says the key to maximizing your protection is to know what’s on your network.

NAC Up Close: Policy Enforcement Options

In the first part of our three-part series about network access/admission control, we examine key technologies and issues so you can choose the right NAC solution for your network.

Network Appliance Clustering: What’s Going On under the Covers?

Feedback on our column about clustering inefficiency.

System p, System i to Get Boost from Power 6

Late last month, Big Blue gave pundits a glimpse at Power 6, the next-generation RISC CMOS it expects to unveil next year

Searching for Solutions – Simplifying E-mail Searching in a World of Frequent Requests

Driven by regulations and internal compliance issues, searching and retrieving old e-mail stores is a challenge. Stronger search tools can help lessen the pain.