September 2014- IT security personnel spend time protecting against external attacks, but often miss the biggest source of data breaches--user-based threats including account hijacking, stolen passwords, insiders and more. Learn more about the need for a user-centric security strategy with this free Gartner report.
September 2014- This white paper examines the current trends in enterprise storage, the ongoing growth and shift toward cloud-based storage services, and how enterprises should choose a cloud service provider. This white paper also provides an overview of AT&T Synaptic Storage as a Service.
June 2014- This report summarizes statistics for 2013 and outlines predictions for 2014 focusing on trends in zero-day vulnerabilities and new cybercriminal tactics.
June 2014- This white paper unveils best practices and technology solutions that help government agencies minimize the risk of security breaches.
June 2014- Dell solutions map to all areas of the FICAM and SICAM frameworks: Credential, identity, and access mgmt, federation, and auditing & reporting.
After an organization been hacked, reducing the amount of time an APT lives within the environment is paramount.
To get the job done organizations must deploy a methodical approach that includes steps to detect/identify, contain - or perhaps not, and remove/recover from the attack as quickly as possible. But the process can't stop there. Attackers are increasingly creative in their methods of attack. To truly gain an advantage against attackers, security ...
March 2014- You just got news of yet another issue that just happened in your business that now you need to deal with - it could be a sexual harassment claim, a tip on an employee stealing, or just someone goofing off on the Internet for way too long. Some issues only require the employees involved to get in a room with HR to address, while others require extensive detective work by the good folks in IT. ...
Are you Catching the Signals
The insider threat is alive, thriving and often responsible for major data breaches that expose everything from consumer credit-card information to valuable intellectual property (IP), and the findings of our most recent survey support this assertion. The results from a pool of 419 enterprise-security respondents revealed that 23 percent of enterprises have experienced insider-driven data breaches.
Download this report and read more about 10 alarming Insider Threat trends.
Security & Risk professionals recognize the value and benefits of implementing an employee-monitoring program. Privacy advocates and Legal and Human Resources professionals see potentially unwarranted invasion of employee privacy as reasons not to monitor, or at least to restrict monitoring to instances where enough "probable cause" exists to warrant tilting the balance between the privacy of an employee and the interests of the company.
In this whitepaper you will learn how to assist company ...
It's now possible to get the same visibility in the public cloud that you have in your own data center - or even better. A Best of Interop 2014 finalist, analysts and media agree that the new iland Enterprise Cloud Services portal provides unmatched visibility into the true costs of cloud as well as performance, security and compliance data.
According to Torsten Volk, research director at Enterprise Management Associates, "iland's new portal exemplifies the ...
According to a recent survey, the cost of downtime over the last few years increased 65 percent. Not surprisingly, growing technology dependence can expose companies to threats from human error, cybercrime and natural disaster - causing their digital infrastructures to come crashing down in a split second.
Read "Disaster Recovery: The Budget Item You Cannot Afford to Cut" and learn why virtualization ensures business continuity; how one company's strong DR plan results in millions ...
March 2014- CommVault Simpana software combines archiving, backup, reporting, snapshot management, eDiscovery, and secure data access into a single software platform - an industry first.
March 2014- The enterprise backup and recovery software market is, as ever, in a state of flux as more and more I&O professionals grow tired of traditional backup methods. From missed backup windows to slow or failed recoveries, many firms are weary of the constant battle with their backup software and are looking for a change.
November 2013- 8 to 10 page Analyst Whitepaper by Ptak / Noel addressing the need for IT to bring Analytics technology to IT to help them be more proactive, predictive providing faster mean time to repair. This paper will also explore how IBM is helping customers with it's new IT Analytics platform that offers Search, Predict and Optimize capabilities.
November 2013- At many companies today, 70 percent of IT budgets - or more - go into maintenance and operations.1 A large chunk of the remainder typically goes toward deploying applications and configuring hardware for them. But what if you could manage the entire solution stack as a single entity, automate most maintenance tasks and deploy new applications in a matter of hours? You'd most likely be able to dedicate far more of your IT budget to innovation ...
November 2013- Enterprise IT departments strive to contribute to the competitiveness of the business organization, developing and deploying innovative applications that can help benefit the bottom line and drive top-line growth. Too often, however, IT managers find themselves unable to develop and deploy applications with the agility they would like. The skills needed to quickly design, test, configure and integrate applications into complex IT environments can be difficult to find, and expert IT staff can quickly become ...
November 2013- It's never been more challenging to work in IT. The continually shifting demands of business and other organizational environments demand a quicker and more effective response from those charged with matching technology to enterprise goals. At the same time, IT faces increased pressures to reduce costs, as markets worldwide force ever-greater efficiencies in enterprise endeavors. In this e-book, we take an in-depth look at these expert integrated systems - what they are, how they work, ...
November 2013- Today's small and midsized data centers need to provide the same seamless delivery of IT services as the ones of major enterprises. With Storwize V3700, IBM has tailored one system specifically to address the block storage needs of the smaller data center, with functions derived from IBM's high-end storage platforms. This paper shows how the innovative and enhanced Storwize V3700 has helped change the storage paradigm by using an IBM-developed platform.
November 2013- For small and midsize businesses, the challenge of building an IT storage infrastructure that is both effective and affordable can be daunting: the amount of information these organizations need to store is constantly increasing, while IT budgets are staying the same, or possibly even shrinking. IT managers will most likely find themselves having to do more with less. Learn how IBM's new features for low-end storage systems can increase efficiency, protect the data storage environment, ...
October 2013- The security world is a scary place, and it's getting scarier. Every day brings more risks, threats, customer demands, and regulations. Worse yet, it's becoming more difficult to recruit and retain people who really get it and know how to help. It's time for a new model. A survey conducted by Forrester Consulting and commissioned by IBM shows that security leaders are partnering with managed security services providers in increasing numbers - and the feedback ...
October 2013- IBM now offers simpler, more affordable solutions for improving endpoint security, patch compliance, lifecycle management and power management within midsized organizations - helping provide continuous visibility, control and compliance while reducing costs and the burden on IT staffs.
October 2013- A data breach, probings, hackers - protect your your critical IT information. What these real-life examples have in common is that perpetrators can attack companies through their IT systems. Read how trusted computing from IBM PureFlex System can help secure your systems against emerging threats.
October 2013- Cloud computing represents an opportunity for enterprise and service provider datacenters to become more agile and flexible by using self-service infrastructure provisioning; automated, dynamic resource pooling and scaling; and consumption-based metering to improve accelerate cloud infrastructure configuration, provisioning, and life-cycle management. IDC estimates that combined enterprise and service provider spending on IT infrastructure hardware and software for cloud datacenters will total more than $42 billion worldwide by 2017.
Buy-and-hold strategies can actually add costs to the datacenter, as systems age in place. Not only do hardware maintenance and software maintenance fees rise, over time - but the aging of applications also costs the organization money. Investing in a transition from POWER5 to POWER7 resulted in a return on investment (ROI) of more than 150 percent over three years.
An insightful and and compelling discussion by IDC that reviews the primary reason for ...
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher quality, and with superior economics.
Downtime can be highly disruptive and expensive to an organization, with cost drivers including lost revenue, reduced employee productivity, reputational damage, and the cost of resources required to address and avoid outages. Most organizations in IDC ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services