Executive Briefings


Case Study: Outsourced Network Security Uses Behavioral Modeling

The Yankee Group predicts that by 2010, 90 percent of all security will be outsourced. Here's how one company made its decision to choose a pro-active security solution.

Emerging Trends in Managing IT Service

Financial Services is an application-intensive industry uniquely reliant on end-user system availability.

Managing the Application Lifecycle to Reduce Risk and Trim Costs

Organizations embrace outsourcing without thinking about how they’re going to manage external applications and services

An Open Letter To IBM

A note on the impact of iSCSI in the storage industry.

IT Budget Survey Results Released

From next year’s growing (or shrinking) budgets to hot spots for new investment, our survey shows how IT will be spending 2005’s funding.

Evaluating the Success of the Novell/SuSE Merger

Has Novell’s acquisition of SuSE been a success? Twelve months later, the jury is still out.

Data Lifecycle Management and the Mainframe Mindset

Without storage manageability, we can't effectively address storage costs, which take up to 60 cents of every storage hardware dollar. So why, in the distributed systems world, are we stuck without decent management tools?



Determining the Value and ROI of an Enterprise Portal, Part 2

We examine how to value a portal investment, examining both the tangible and "soft" benefits of the technology. We'll also look at the buy-versus-build debate, and factors to consider in determining a portal's ROI.

Does Open-Source Software Mean Better Security?

Setting the open-source security record straight

Best Practices: Patch Management

To more rapidly test patches and keep network configurations from drifting, keep a closer watch on every device’s configuration

Determining the Value and ROI of an Enterprise Portal, Part 1

As the portal market becomes increasingly more competitive, the vendor choices grow to be even more complex. We discuss the value of an enterprise portal and methods for determining its return on investment.

Ten Best Practices to Secure Web Services

As more organizations embrace Web services (which opens back-office processes to partners and the Internet), a problem is emerging: who inside the organization is in charge of Web services security?

Growing Your IT Budget with Communication

IT organizations can take steps to increase their standing with business leaders and grow their IT budgets—but how many are actually doing so?

Understanding the New Breed of Hackers

Knowing how today's hackers think and work is the first step to combating their attacks.

Best Practices: Security Budgeting for 2005

IT must cope with under-funded regulations, more CIO leeway

Patch or Perish: Symantec Notes Dramatic Increase in Threats

Symantec's assessment of system vulnerabilities in the first half of this year shows a dramatic increase in the number and potential destruction of security threats.

It’s Time for Your Data to Talk: A Look at Data Integration

Successful data integration can mean the difference between a company that realizes its full potential and one that just keeps missing the mark. We present an overview of what’s involved to successfully cleanse and integrate data on disparate systems in multiple locations.

Strategies: Software Tools Help Sell IT to Decision-Makers

Now, more than ever, IT departments are selling themselves to business leaders—and tapping new software tools to help them do it

Five Steps to Enforcing Your Endpoint Security

Your security policy has to have teeth. Here's how to enforce your endpoint security policy.

Rx for Corporate Performance: Spend Less on IT, Leave Competitors in the Dust

The gap between top-performing and middling companies is widening. Could some organizations be left permanently behind?