Enterprise


Improving Automated Vulnerability Remediation

Given the incredibly small window afforded IT managers for patching vulnerable systems, security experts recommend getting help in categorizing vulnerabilities as well as in determining which are actually present.

How to Get the Best Network Traffic Reports

Probes give you the visibility to effectively monitor the network and boost troubleshooting power to ensure optimal traffic patterns.

Q&A: Harnessing Trusted Computing Modules

Planning identity management or authentication rollouts? Don’t forget to factor in the Trusted Computing Modules now built into many PCs.

The New ECM Crowd: Little Guys with Big Ideas

Is enterprise content management the right tool for data management?

IBM’s z9 Stirs Up Mainframe Market

MIPS-wise, the new z9 is among the most flexible mainframe systems IBM has ever developed.

Successful Project Management: Think Iteratively, Code Early

Is the way most enterprises develop software fundamentally flawed?

Sarbanes-Oxley: Enterprises Turning to Automation

Automated security and access controls get top attention as enterprises move into their second year of Sarbanes-Oxley compliance.



Careers: Four Areas for Building Skills to a "T"

What shape is your skill profile? Have you thought about what balance you need between specialist and generalist skills to thrive in today's environment?

Business Continuity and Disaster Recovery: Four Key Questions

We examine the approaches for business continuity and disaster recovery and what your data-driven enterprises can do to ensure better business continuity in the event of an outage

Acopia Networks Brings Threads Together

The mirror cracked ... thanks to suspicious information

Web Services: Where Identity Management Goes From Here

SAML, Liberty, WS-Federation—a number of Web Services standards are competing for security managers’ attention. Here’s how to differentiate between the options.

Big Blue’s SOA Blitz

Are the ESB visions touted by IBM, BEA, and others a new spin on an old idea: vendor lock-in?

Putting IPS Claims to the Test

A neutral, third-party testing organization rates IPS performance, accuracy, and reliability.

Oracle Ratchets Up the Pressure on SAP

Oracle can now lay claim to best-of-breed database, HR, CRM, and analytic software in its fight with SAP

Data Auditing's Role in Governance and Risk Management

Corporate governance, risk management, and compliance are challenges that will determine your company’s future. Here's how data auditing can help.

Q&A: Targets Shift for Application Security Attacks

With attackers gunning for sensitive information, it’s time to rethink Web application code development or face the consequences.

A Mainframe First: J2EE Performance Testing for Big Iron Web Apps

Big Blue’s Rational Performance Tester for z/OS isn’t a technology in search of a market—it’s a reflection of market demand, IBM officials say

Time For a SAN Report Card

The old song "Who's Sorry Now" is playing loud and clear in many IT shops.

Four Strategies for Communicating with Outsourcers

How to make sure you and your oursourcing provider are in sync.

New Data Security Standards Set for Utilities

New regulations mandate increased security for utilities' supervisory control and data acquisition systems