Software


Test Steps for Auditing Virtualization

How to review critical controls that protect the confidentiality, integrity, or availability of environment for the supported operating systems and users that rely on the environment.

Auditors, Employers at Odds Over Security

A new survey shows a disconnect between the security-first mentalities of auditors and the compliance-driven concerns of their employers.

Five Steps to a Continuously Compliant Data Center (Part 2 of 2)

These five steps provide a road map for continuous compliance in the data center.

Last Call for IPv4

It's time to start planning your transition to IPv6.

Clerity Updates Mainframe Rehosting Reference Architecture

Adds Syncsort DMExpress to updated end-to-end architecture designed to reduce cost, complexity, time-to-market during mainframe migration and modernization.

Orchestrated ALM: The Secret to Developing "Killer Apps"

Speed and efficiency in app development and delivery are critical to building a winning enterprise.

Microsoft Announces Plans for Licensing Changes

Company announces Client Access License changes at its management summit.



Hitachi ID Launches Privileged Access Manager, Self-Service Anywhere

Updated Hitachi ID Management Suite includes access control for privileged accounts, session monitoring, access to self-service for mobile users.

Accellion Introduces Enterprise Secure Collaboration Solution

Secure information sharing that meets compliance standards.

IBM Unveils New Pre-Engineered Technology Services Model

New approach cuts transformation time by over 60 percent, accelerates ROI.

Microsoft Releases Windows Intune

MDOP updates planned.

Integrating Physical and Logical Access Control

Two security approaches, working in tandem, provide superior enterprise protection.

Blade Server Demand Driving High-Density Zones

High-density zones strike a balance between the power and cooling requirements of different kinds of data center assets. The rub, of course, is that they'll cost you.

Xangati Solution Tracks Infrastructure Components Affecting VDI Performance

New virtual desktop infrastructure dashboard leverages performance health engine to ensure optimal end-user experience.

ScriptLogic’s Privilege Authority Professional Elevates Privileges While Maintaining IT Security

IT administrators can elevate user privileges without giving users local administrator status.

Q&A: High-Availability Gets High Marks at School District

Load balancing helps provide high access on report-card day.

5 Steps to a Continuously Compliant Data Center (Part 1 of 2)

These five steps provide a road map for continuous compliance in the data center.

Slowly but Surely, IT Addresses Mobile Security Threats

Nine out of ten enterprises say they plan to invest in new endpoint security technologies to help them better manage mobile devices

rPath IT as a Service Transformation

rPath X6 offers visual “pushbutton” command-and-control center for managing the lifecycle of software stacks and eases configuration across environments.