Enterprise


Corporate Life or Death: Data Breach Triage

When disaster strikes and victims flood into an emergency room, doctors conduct triage to determine the severity of injuries and who gets treatment first. Companies can similarly prepare for the inevitable data breach by building a cross-disciplined incident team trained to assess the damage, stop the bleeding, and respond appropriately to regulatory bodies and customers.

Symantec Report Highlights Web Security Struggle

To reverse the rise of Web-application vulnerabilities, enterprises must patch more than just their operating systems.

Case Study: Software Helps Health Insurance Giant Analyze, Extract Mainframe Rules

Health insurance provider balances valuable mainframe logic against need for more manageable system

Proving Grounds: Securing Test Data in Regulatory Environments

In many companies, developers use live data in unsound, test environments but remain unmindful of the fallout if that data leaks out. Why should your compliance guard be relaxed when developers use test data to design the systems that store and dole out access to such sensitive information? Here are five ways to manage test data in regulated environments.

Podcast: Managing Storage Demands

Expect storage demands to spike during the holidays. Here’s how to get control.

SOA: It’s the Business that Matters

Those who have built and deployed successful SOA projects know it’s all about meeting business needs.

Storage Clusters and Beer: It’s All in the Hops

Is a software-only solution to storage manipulation on the horizon?



Mainframe Pros Question IBM’s Spending Initiative

Some mainframers think IBM’s $100 million could be better spent addressing training, licensing, and other long-standing Big-Iron pain points

Seagull’s BlueZone: Terminal Emulation with an SOA-Friendly Tip

Customers can service-enable terminal-based applications and effectively transform them into full-fledged SOA assets

Encryption Provides Safety Net for Enterprises

A new encryption solution promises to keep employees honest and reduce the number of enterprise "insiders."

Compuware Delivers Mainframe DB2 Performance Tool

How to get even more oomph out of IBM’s zIIPy new DB2 processor engine

Mainframe’s Future: IBM to Focus on Ease of Use

IBM is putting its money where its mouth is—spending $100 million over the next five years to make its mainframe systems easier to use

Real World Requirements for Unified Threat Management

Three key features IT should look for when shopping for a UTM solution.

Next-Generation Storage: Low Cost Isn’t Enough

New vendors trumpet products with lower price tags, but if they lock you into a single source, what’s the point?

Fundamentals of Application Performance Management

All APM solutions are not created equal.

Voice-Enabling IT Apps Gets Easier with Multi-Vendor Package, VoiceXML

Two companies have teamed up to simplify creating voice-enabled applications

ITIL to ILM, Part II

ITIL emerged from an effort to establish better coordination and service-level controls over IT infrastructure within the British government. It’s certainly changed since then.

In Offshore Markets, Security Lags, AJaX Leads

Nearly four-fifths of Chinese developers have experienced a security breach of some kind in the last 12 months, while non-U.S. developers are taking the lead with AJaX.

Protecting Remote-Site Data

EdgeSecure makes it easier to protect data stored in remote locations.

How SOA is Driving a New Type of Enterprise Application

Business process applications ensure that enterprise applications match business needs.