Enterprise


Podcast: Remote Access Best Practices

Best practices for accessing corporate information remotely

Case Study: Software-as-a-Service Quickly Enables File and Application Sharing

On-demand application suite offers big benefits for a small company

CA Announces Latest Milestone in the ITILization of Its Toolset

Is ITIL tailor-made for the Six Sigma Generation?

Backup/Recovery Strategies: Protecting Road Warriors (Part 1 of a 3-part Series)

IT must acknowledge the importance—and risks—of mobile computing tools and start building processes to protect corporate data.

Unified Theories of Data Management

How do we manage the combined output of all of the event logs produced by all the available, and frequently used, management tools?

Survey Says Big Iron a Solid Bet for the Future

The mainframe is entrenched for the long haul, respondents say

Beyond Logs: Security Event Management Market Heads For Shakeout (Part 2 of 2)

Experts predict imminent SEM market consolidation. The upside: lower software costs, easier usability, and improved efficiency. Even so, users will be faced with a dizzying array of options.



Tool-and-Die Makers in a Knowledge Economy

The full potential of tools to support knowledge work remains unrealized

Making the Business Case for Big Iron

A growing number of mainframe pros are trying to educate their colleagues and C-level executives about the business case for Big Iron.

Sometimes It’s Not a Storage Issue

Trying to reconcile the technologies and products offered by the storage industry with the actual problems confronting IT can seem like a thankless job.

Reducing Complexity in the Enterprise Data Center

Businesses need to be agile. An interconnect-driven server architecture may help. Here’s how.

Anti-Spyware Gets Rootkit Removal

New anti-spyware functionality highlights the enterprise security question: should you go for best of breed or opt for a security suite?

Podcast: Protecting Mobile and Remote Users

Best practices to keep mobile and remote users safe

Spyware Threats Skyrocket for Enterprises

A new study shows spyware is the fastest-growing threat to enterprises.

Best Practices for IT Migration Projects

Eight best practices to keep the user experience front and center during IT migration projects.

Records Managers Are Suddenly Sexy

Data management should stand on its own as an umbrella effort driving all of IT’s efforts, because the essential task of IT is data management.

Careers: The Incredible Shrinking Economic Recovery

When is an economic recovery not an actual recovery? When it benefits the few at the expense of the many.

Security Briefs: JavaScript Worm, IBM DB2 Vulnerability, NIST Performance Metrics

Dealing with an e-mail worm targeting a Web application, and a vulnerability in IBM DB2. Plus, how to create a performance metrics program.

Beyond Logs: Creating a Log-Management Program (Part 1 of 2)

Regulations are driving companies to audit their security logs. To help collect and analyze all that data, companies can turn to free syslog software and off-the-shelf security event management software. Which approach is right for you?

Podcast: Getting the Storage Infrastructure Info You Need

Storage consumes as much as one-third of an IT budget, but getting information about storage (especially storage utilization) has been difficult at best.