|
|
|
|
Analysis: Enterprise Key Management
4/30/2007
If you don't manage encryption--and the keys that it generates--wisely, data will eventually be lost or compromised. We discuss how to keep keys manageable and safe now, and discuss what to look for in an enterprise key management system
Analysis: Automated Code Scanners
4/16/2007
Vendors claim that adopting source-code security analyzers will fortify your business and protect your precious data. But should they be your only line of defense, or will they simply lull the IT staff while criminals still prowl?
More Compliance Reports
|
|
|
|
|
|
|
|
The State of Data Backup Protection
6/25/2007
Cheap disks and smoking bandwidth have changed the face of backup. In tandem with evolving technologies like de-duplication and more efficient use of VTLs, backup is hot. We explore new approaches to data archiving that won't bust your budget.
IT Automation: Server Configuration Management
6/11/2007
Looking to make your network and IT staff more efficient? In this installment of our TCO series, we examine the costs associated with server configuration management, including predeployment planning, rollout and product maintenance. The price tag may be high, but it's a worthy investment
More Data Center Reports
|
|
|
|
|
|
|
Analysis: SOA-Aware Network Infrastructure
6/25/2007
When it comes to your service-oriented architecture, do you really need an ESB, management, governance and specialized security? And how do you choose a vendor partner wisely? Which components are a must and which will become monsters to manage? We delve into the SOA infrastructure, defining components, products and functions you need for effective deployment.
Ethernet Goes Green
5/25/2007
The IEEE's Energy Efficient Ethernet group is studying how to cut Ethernet's power requirements through a technology called Rapid PHY Selection. But there are a number of hurdles to overcome.
More Network Infrastructure Reports
|
|
|
|
|
|
|
|
|
|
|
|
|