The Yankee Group predicts that by 2010, 90 percent of all security will be outsourced. Here's how one company made its decision to choose a pro-active security solution.
Financial Services is an application-intensive industry uniquely reliant on end-user system availability.
Organizations embrace outsourcing without thinking about how they’re going to manage external applications and services
A note on the impact of iSCSI in the storage industry.
From next year’s growing (or shrinking) budgets to hot spots for new investment, our survey shows how IT will be spending 2005’s funding.
Has Novell’s acquisition of SuSE been a success? Twelve months later, the jury is still out.
Without storage manageability, we can't effectively address storage costs, which take up to 60 cents of every storage hardware dollar. So why, in the distributed systems world, are we stuck without decent management tools?
We examine how to value a portal investment, examining both the tangible and "soft" benefits of the technology. We'll also look at the buy-versus-build debate, and factors to consider in determining a portal's ROI.
Setting the open-source security record straight
To more rapidly test patches and keep network configurations from drifting, keep a closer watch on every device’s configuration
As the portal market becomes increasingly more competitive, the vendor choices grow to be even more complex. We discuss the value of an enterprise portal and methods for determining its return on investment.
As more organizations embrace Web services (which opens back-office processes to partners and the Internet), a problem is emerging: who inside the organization is in charge of Web services security?
IT organizations can take steps to increase their standing with business leaders and grow their IT budgets—but how many are actually doing so?
Knowing how today's hackers think and work is the first step to combating their attacks.
IT must cope with under-funded regulations, more CIO leeway
Symantec's assessment of system vulnerabilities in the first half of this year shows a dramatic increase in the number and potential destruction of security threats.
Successful data integration can mean the difference between a company that realizes its full potential and one that just keeps missing the mark. We present an overview of what’s involved to successfully cleanse and integrate data on disparate systems in multiple locations.
Now, more than ever, IT departments are selling themselves to business leaders—and tapping new software tools to help them do it
Your security policy has to have teeth. Here's how to enforce your endpoint security policy.
The gap between top-performing and middling companies is widening. Could some organizations be left permanently behind?