Given the incredibly small window afforded IT managers for patching vulnerable systems, security experts recommend getting help in categorizing vulnerabilities as well as in determining which are actually present.
Probes give you the visibility to effectively monitor the network and boost troubleshooting power to ensure optimal traffic patterns.
Planning identity management or authentication rollouts? Don’t forget to factor in the Trusted Computing Modules now built into many PCs.
Is enterprise content management the right tool for data management?
MIPS-wise, the new z9 is among the most flexible mainframe systems IBM has ever developed.
Is the way most enterprises develop software fundamentally flawed?
Automated security and access controls get top attention as enterprises move into their second year of Sarbanes-Oxley compliance.
What shape is your skill profile? Have you thought about what balance you need between specialist and generalist skills to thrive in today's environment?
We examine the approaches for business continuity and disaster recovery and what your data-driven enterprises can do to ensure better business continuity in the event of an outage
The mirror cracked ... thanks to suspicious information
SAML, Liberty, WS-Federation—a number of Web Services standards are competing for security managers’ attention. Here’s how to differentiate between the options.
Are the ESB visions touted by IBM, BEA, and others a new spin on an old idea: vendor lock-in?
A neutral, third-party testing organization rates IPS performance, accuracy, and reliability.
Oracle can now lay claim to best-of-breed database, HR, CRM, and analytic software in its fight with SAP
Corporate governance, risk management, and compliance are challenges that will determine your company’s future. Here's how data auditing can help.
With attackers gunning for sensitive information, it’s time to rethink Web application code development or face the consequences.
Big Blue’s Rational Performance Tester for z/OS isn’t a technology in search of a market—it’s a reflection of market demand, IBM officials say
The old song "Who's Sorry Now" is playing loud and clear in many IT shops.
How to make sure you and your oursourcing provider are in sync.
New regulations mandate increased security for utilities' supervisory control and data acquisition systems