News

Enterprise information security management

  • December 07, 2006 07 Dec'06

    Acquisition bolsters IBM's compliance, security portfolio

    IBM's purchase of Dutch software firm Consul gives it a security and compliance auditing product that runs on both distributed and mainframe systems.

  • December 06, 2006 06 Dec'06

    Nationwide Insurance swaps servers for virtualized mainframes

    By virtualizing hundreds of servers on a pair of IBM mainframes, a national insurance company saved millions of dollars and halted server sprawl.

  • November 16, 2006 16 Nov'06

    ERP consolidation may threaten innovation in application development

    AMR research analyst Jim Shepherd and two top IT executives sound off on the pluses and perils of consolidation in the ERP space at AMR's recent conference in Boston.

  • November 09, 2006 09 Nov'06

    Dell rolls out servers with quad-core chips

    Dell has released a line of servers with Intel's new quad-core Xeon chip.

  • November 08, 2006 08 Nov'06

    Server energy efficiency standard completed

    The EPA and industry leaders finished a server energy efficiency standard that would allow end users to compare energy usage for 1U and 2U rack servers.

  • November 08, 2006 08 Nov'06

    Got IT credentials?

    SMBs hire all types of IT professionals, from those with a basic four-year college degree to MBA's, PhD.'s, technical certifications and more. Does it matter?

  • November 07, 2006 07 Nov'06

    Microsoft tackles second zero-day threat in a week

    This time, attackers are going after a zero-day flaw in Windows, and Microsoft has released some workarounds until a patch is available.

  • November 02, 2006 02 Nov'06

    IAM deployment snapshot

    Blue Cross and Blue Shield of Kansas City had a list of requirements and projected costs for its identity and access management project. Here's the details.

  • November 02, 2006 02 Nov'06

    Secure access and simplicity -- a balancing act that pays off

    Securing $5 billion worth of investment portfolios while allowing easy access for customers and partners are just a few of the challenges investment firm Financial Engines meets -- while keeping up with compliance standards.

  • November 01, 2006 01 Nov'06

    Mobile device encryption: A best practice that no one uses

    Experts and IT executives agree that mobile device encryption is the best way to protect data. But too few companies are actually deploying this critical technology.

  • October 26, 2006 26 Oct'06

    ID and access management: Just say yes

    Implementing an identity and access management system begins with the executive approval process. Joel Dubin offers detailed steps to winning over your CEO and CFO with ROI benchmarks.

  • October 25, 2006 25 Oct'06

    IT perplexed by password-protection challenges

    Despite using a plethora of preventive measures, IT managers can't seem to stop users from recording their passwords on Post-It Notes or in their PDAs. Experts say it's like locking your front door and sticking the key to the doorbell.

  • October 24, 2006 24 Oct'06

    'Agentless' SOA system unveiled by AmberPoint

    AmberPoint calls its 'agentless' architecture the next step in runtime governance for SOA, as policy enforcement moves increasingly to appliances, ESBs and even operating systems.

  • October 18, 2006 18 Oct'06

    Consulting, hardware purchases flat in 2007

    IT budgets are expected to increase 4-6% in 2007, according to industry experts. The focus of next year's budgets will be more on software and less on consulting and hardware spending.

  • October 12, 2006 12 Oct'06

    Midmarket pros have NAC for identity, access management

    Midmarket firms may not have the budgets of large companies, but IT pros can build identity and access management programs that are as effective as what the big guys have.

-ADS BY GOOGLE

SearchCompliance

SearchHealthIT

SearchCloudComputing

SearchMobileComputing

SearchDataCenter

Close