Enterprise information security management
- July 16, 2009
IT portfolio management features aren't a top priority for users of PPM software, a SearchCIO.com survey shows, but PPM strategy is.
- July 15, 2009
What goes into successful project management governance? The best mix calls for just the right amount of process and a focus on improved project completion rates.
- July 08, 2009
Users have found multiple uses for network access control, including growing usage for guest networks. Understanding which of NAC's four main use cases is yours is crucial to selecting the right system.
- July 01, 2009
Gartner predicts that by 2016, maturing technologies will supplant many security experts. The jobs that survive will be all about risk management.
- June 09, 2009
CIOs need to marry business application and BI development efforts to create a cohesive BI strategy, especially when adding analytical capabilities to enterprise applications.
- June 05, 2009
Should midmarket companies consider using outside providers to manage their data protection services? For companies with smaller staffs and budgets, using a third-party provider to manage their ...
- May 12, 2009
Building a global privacy program is no picnic because of the plethora of laws. IT security tools can help -- or hurt, if implemented without knowledge of the law.
- April 21, 2009
After running IT on a shoestring, the CIO of a growing firm gets a 15% budget increase to support global expansion and prepare the business for the upturn.
- March 26, 2009
A CIO group offers a checklist for security compliance as disbursement of federal funds will open up risks and come with stricter requirements.
- February 25, 2009
A new CISO builds an information security architecture to analyze log files and create metrics for business discussions on compliance and security.
- February 12, 2009
The Salvation Army is turning to workforce realignment and clientless remote access tools to stave off layoffs, cut costs and increase efficiencies during this recession.
- February 11, 2009
Our NAC series concludes with a look at why one security architect chose a software-based approach. Hint: Cost and standards were factors.
- February 11, 2009
Network access control is controversial but needed, experts say. Read our collection of case studies to learn how three universities have put the technology to work.
- February 10, 2009
SearchCIO.com's comprehensive survey of IT spending plans for 2009 shows that the recession is taking a bite out of IT budgets, particularly for hardware purchases. Security and compliance spending is up, and the focus on business intelligence ...
- February 03, 2009
Virtual desktops have strong security and management benefits, but looking to desktop virtualization to save money may be a stretch.