Enterprise


The Enterprise Year in Review

From acquisitions to outsourcing, it was a very busy year

iConclude Tackles Automating Problem Resolution

Problem identification is no longer sufficient—what's needed is the ability to diagnose and repair problems quickly before they seriously impact your customers or end users.

Q&A: The Future of Security, Control, and SOX Compliance

Sarbanes-Oxley compliance started chaotically. By its second year, however, many organizations were investigating how automated controls could help them see SOX not as an annual cost but as a way to reduce business risk. What’s in store for year three?

Toigo’s Tomatoes 2005

If you don't have something nice to say, say nothing at all, right? Storage columnist Jon Toigo ignores that advice as he looks at the three worst events and trends in the storage industry this year.

Changing Times at CA

Does grey knight CA—“the industry’s safety net”—have a new set of priorities?

Trust, Verify, and Triangulate

"Trust but verify" is no longer enough; today you must trust, verify, and triangulate in order to acquire organizational knowledge that you can rely on.

Spyware Hampering Compliance Initiatives

Spyware poses a huge threat—yet a recent survey shows that by their own admission, many enterprises have yet to protect their information with suitable anti-spyware software.



Sun’s UltraSPARC T1 Redefines the Rules of the Game

UltraSPARC T1 is a marvelous achievement, to be sure—but will its cutting edginess translate into market success?

An Rx for Network Authentication Anarchy

A new appliance acts as a meta-broker to the wild profusion of competing network access control schemes

Attackers Shift Exploits to Applications

The 2005 SANS Top 20 list of the worst vulnerabilities finds attackers deserting operating system vulnerabilities, for flaws in applications and network devices.

Q&A: What Makes a Good Chief Information Security Officer?

To succeed, a chief information security officer needs project management skills, business process expertise, a budget, and authority—and an aptitude for diplomacy.

Can Networks Defend Themselves?

Just think of it: routers and switches no longer need separate firewalls, IDS/IPS appliances, or other security technologies to shield themselves from attacks. Fewer boxes to maintain, fewer management systems to support—what’s not to like? As it turns out, plenty.

Storage Products of the Year

Our storage guru Jon Toigo has always been suspicious of industry awards. Rather than looking at slick literature, Jon evaluates dozens of products each year to find what's worthy of your consideration. Here are the Toigos for 2005.

Careers: Study Shows You're Working Harder than Ever

If you think you’ve got a lot more on your plate these days, you’re probably right

Take IT from Bottom-Line Expense to Strategic Investment

How can IT—which takes 4.5 of a company's revenue—show itself to be a positive force on the company's bottom line?

Case Study: Wireless Provider's Remote Access Success

Giving mobile users access to enterprise applications and internal portals via an SSL VPN can be tricky. Midwest Wireless' implementation was exceptionally smooth. What's their secret?

Careers: IT Employment Bucks National Trend

IT has experienced relatively healthy job growth in the U.S. during a period when job growth as a whole remained stagnant

Trouble Brewing Between SAP and Big Blue?

Does IBM’s new master data management pitch take SAP, Oracle, and other enterprise applications vendors out of the loop?

Malware Clean-Up Swamps IT Managers

Companies favor security technology, overlook adequate user training

Storage Encryption: Let the Feeding Frenzy Begin

Extra weight isn't just for the holidays. Here's a diet plan that might interest you.