Enterprise


Beyond Logs: Creating a Log-Management Program (Part 1 of 2)

Regulations are driving companies to audit their security logs. To help collect and analyze all that data, companies can turn to free syslog software and off-the-shelf security event management software. Which approach is right for you?

Ubuntu Ready for the Enterprise

The Ubuntu GNU/Linux distro launched on June 1 was designed specifically with large organizations in mind, says the open-source project's founder.

Q&A: The Quest (and Justification) for Trustworthy Code

How to evaluate the security of applications you build or buy, and justify those requirements to senior management.

Careers: A Job-Seeker’s Market

Thanks to reduced unemployment and a graying workforce, we could be on the verge of a war for top IT talent. That bodes well for mainframe pros.

Storage News and Abuse

Equal parts architecture and marketecture continue to dominate the releases coming out of the storage industry.

Podcast: Remote Site Backup

No backup plan is complete without protection for remote sites. We explore challenges, best practices, and agentless technologies.

CA Updates Mainframe Security Tools

Changes target regulatory compliance, auditing, and access controls



Case Study: HIPAA Concerns Push Network Security Solutions

A federal regulation forced a medical center to lock down privacy, which coincidentally increased savings.

IBM and Microsoft Crank up the Pressure on Rivals

IBM and Microsoft made significant data management-related announcements last week

Podcast: Testing Distributed and Composite Applications

Best practices for testing composite and distributed applications

Why Colleges Fail the Privacy Test

Most college Web sites lack online privacy policies. What does that say about their ability to secure people’s private information and to avoid data breaches?

SHARE-ing: The Secret of Big Iron Success

With the revitalization of the mainframe and the rise of zNextGen, SHARE itself has been revitalized. (First in a series)

Careers: Where the Jobs Are

Not being business savvy could become a resume liability as time goes by

How Vista’s Arrival Will Affect the Security Market

Vista’s arrival will shake up the $3.6 billion Windows security market. Here are the implications for IT managers.

Cracking the Code of Data Protection

Storage consolidation into a SAN is often a code word for re-centralization, a strategy based more on nostalgia than necessity—or benefit.

Monitoring VoIP Communication: Five Key Measures

Five key measures to monitor to address infrastructure problems.

Podcast: Wikis in the Workplace

How this popular consumer tool fits in the enterprise

IMS at a Crossroads?

Far from expanding their use of that DBMS, analysts argue customers need to start planning their migrations now

Beware Active Microsoft Word Vulnerability, Rogue Browser

Microsoft moves to patch a “zero-day” Word vulnerability. Meanwhile in a first, a new worm arrives bearing its own browser—the better to launch drive-by download attacks.

White Paper: CA's Legacy Renewal Solution

Learn how you can retain and extend the value of your mainframe applications