-
By
By proactively managing new technology implementations and fully understanding the old IT environment, your organization can meet end-user expectations faster while managing the overall impact to your network.
-
Bring-your-own-device approaches can be a nightmare for security administrators. Identity-based security can help eliminate risks posed by mobile hardware.
-
By
IAI is a new approach to the problem of identifying unauthorized user behavior that augments other types of security products and processes. Here's how it works.
-
By
Hack reveals lack of basic security standards.
-
By
According to a new survey, some companies lose up to 75 percent of their security devices.
-
By
More than half of respondents aren’t considering continuous firewall compliance; more than one in ten never perform firewall audits.
-
By
Survey reflects shift in backup/recovery priorities.
-
In the 1990s, tape fell out of favor, but on the 60th anniversary of this technology, it's finding a reversal of fortune.
-
By
A look at the true cost of compliance failures and how to avoid being buried in trouble.
-
Think printing is just for creating hard-copy reports? Think again.
-
RTM in August foretells Fall availability of two key Microsoft products.
-
By
MagicJack PLUS and NetTalk DUO WiFi provide surprisingly good voice quality, plenty of features.
-
By
Dimension Data report warns that BYOD, video, and virtualization are shortening network life expectancy.
-
As the buzz over big data grows, what's changed in the last year? How has machine-generated data changed the way IT tackles big data?
-
By
These steps will help you begin building and executing a defensible deletion strategy.
-
By
Data integration between applications remains biggest challenge.
-
By
Two-thirds of senior managers are in the dark about where their company data resides; more than one in ten enterprises have no plans to manage cloud-based storage services.
-
By
Traditional deep packet inspection may no longer be able to protect your environment. We look at a new approach -- deep content inspection.
-
-
By
Researchers find "video protocols were surprisingly unstable," exposing consumers to a variety of potential threats.
-
By
Outbreak of Trojan.Milicenso sends printers into spasms.
-
By
Security breaches, data loss could increase with popularity of online file sharing.
-
By
However, use doesn't mean social media is part of the company's overall strategy.
-
By James E. Powell
Big data is changing the competitive dynamics of the BI industry. We explore how everything from sensor data to social media to mobile BI is changing the very nature of big data.
-
By James E. Powell
What’s driving big data analytics, and how can integrating search help BI professionals better work with the data?