CMP.com
Compliance Network Infrastructure Application Performance Optimization Network Access Control
Network & Systems Management Security Mobile & Wireless Storage & Servers Data Center
Business Intelligence SOA & App Architecture Messaging & Collaboration Unified Communications

Featured Report

Rolling Review: In-Line NAC shadow
shadow
Rolling Review: In-Line NAC
We sent five inline NAC vendor a detailed invitation letter with breakdowns of our equipment and made ourselves available for questions. We asked vendors to supply a solution they would recommend for our test scenario leaving a number of decisions open to them.
More Network Access Control Reports
Featured Report

Vista in the Enterprise shadow
shadow
Vista in the Enterprise
Research and analysis to plan and design your deployment of Vista in your enterprise. Windows Vista is here, but most large organizations are taking a wait-and-see approach. Few firms with complex infrastructure environments can justify the cost of upgrading existing client hardware, application remediation, server infrastructure improvements and user training to implement what amounts to an incremental upgrade in interface, security features and network performance. This NWC Analytics Tech Report lays out Vista deployment strategies and tactics, so you can use it to prepare your own enterprise for the deployment of Vista on the desktop.
Get the Report for FREE (for a limited time)
Featured Report

APM Rolling Review: App Monitoring Made Really Easy shadow
shadow
APM Rolling Review: App Monitoring Made Really Easy
For the first installment in our APM Rolling Review, we brought Indicative's Service Director into our lab and set it to monitor our document management application environment. Indicative's Service Director kicks off our application performance management review series in fine style.
More Network Access Control Reports
Network Computing Issues
Download InformationWeek's October 8, 2007 issue in its entirety.

InformationWeek<br />October 8, 2007 shadow
shadow
InformationWeek
October 8, 2007



Strategic Security

Security

E-Discovery: New Federal Rules Require A Proactive Strategy
7/7/2007
Defining your requirements is key as the market for e-discovery technology gets crowded and confusing.

Rolling Review: Guardium SQL Guard
8/13/2007
Guardium has put together a solid feature set that should please security pros looking to take back control of database activity.

Sponsored

More Security Reports

Messaging & Collaboration

Analysis: Video in the Enterprise
6/29/2007
From corporate communications to customer support, a video stream is the next best thing to being there. Here's how to make it work on your network.

SIP-Based Push-to-Talk Moving Into Enterprise Territory
6/25/2007
SIP Push-to-Talk holds promise of using a VoIP infrastructure to streamline communication with two-way, walkie-talkie-like call functionality.

Sponsored

More Messaging & Collaboration Reports

Compliance

Analysis: Enterprise Key Management
4/30/2007
If you don't manage encryption--and the keys that it generates--wisely, data will eventually be lost or compromised. We discuss how to keep keys manageable and safe now, and discuss what to look for in an enterprise key management system

Analysis: Automated Code Scanners
4/16/2007
Vendors claim that adopting source-code security analyzers will fortify your business and protect your precious data. But should they be your only line of defense, or will they simply lull the IT staff while criminals still prowl?

Sponsored

More Compliance Reports

Application Performance Optimization

Windows Stack Changes Boost Network Performance
4/30/2007
Enhancements to Longhorn and Vista--such as receive-side window autotuning and Compound TCP speed data transfer--look to make more efficient use of network resources.

Analysis: Optimizing Your WAN
5/14/2007
Few users rave when application traffic traversing a beefy corporate LAN meets a typical WAN. Even fewer enterprises are willing to spend to fix the problem. The answer: Make the most of expensive wide-area pipes with optimization appliances.

Sponsored

More Application Performance Optimization Reports

Data Center

The State of Data Backup Protection
6/25/2007
Cheap disks and smoking bandwidth have changed the face of backup. In tandem with evolving technologies like de-duplication and more efficient use of VTLs, backup is hot. We explore new approaches to data archiving that won't bust your budget.

IT Automation: Server Configuration Management
6/11/2007
Looking to make your network and IT staff more efficient? In this installment of our TCO series, we examine the costs associated with server configuration management, including predeployment planning, rollout and product maintenance. The price tag may be high, but it's a worthy investment

Sponsored

More Data Center Reports

Network Infrastructure

Analysis: SOA-Aware Network Infrastructure
6/25/2007
When it comes to your service-oriented architecture, do you really need an ESB, management, governance and specialized security? And how do you choose a vendor partner wisely? Which components are a must and which will become monsters to manage? We delve into the SOA infrastructure, defining components, products and functions you need for effective deployment.

Ethernet Goes Green
5/25/2007
The IEEE's Energy Efficient Ethernet group is studying how to cut Ethernet's power requirements through a technology called Rapid PHY Selection. But there are a number of hurdles to overcome.

Sponsored

More Network Infrastructure Reports

Storage & Servers

From Our Lab: XenSource's XenEnterprise Is A Virtualization Bargain
7/14/2007
XenSource's XenEnterprise offers solid performance and ease of use, and handily beats VMware on price. We put the 3.2 version to the test.

The Blu-ray/HD-DVD Format Battle
6/25/2007
Blu-ray and HD-DVD are the future for data and video, but industry infighting and lack of a single standard may slow broad adoption. Although Blu-ray is likely to dominate, investment in either technology should be postponed until a clear winner emerges.

Sponsored

More Storage & Servers Reports

Network Access Control

TechTracker: NAC Standards: Groups Marking Territory
10/26/2006
The plans of Microsoft and Cisco to integrate their respective network-access-control architecture frameworks are a positive sign. They don't, however, make all integration problems related to NAC go away; hence the need for vendor-neutral NAC standards.

Tutorial: Network Access Control (NAC)
7/17/2007
Network access control helps overburdened security groups level the playing field. Here's how to get started protecting your networks from malicious or misconfigured hosts.

Sponsored

More Network Access Control Reports

SOA & App Architecture

APM Rolling Review: App Monitoring Made Really Easy
8/2/2007
For the first installment in our APM Rolling Review, we brought Indicative's Service Director into our lab and set it to monitor our document management application environment. Indicative's Service Director kicks off our application performance management review series in fine style.

Analysis: SOA Security
7/30/2007
Opening your internal systems to business partners via SOA can deliver big efficiencies as well as big risks. Having the right security measures in place beforehand is critical; unfortunately, the market is characterized by interoperability glitches and rapidly evolving products. Technology analyst Andy Dornan delves into the SOA security landscape to help you in your decision-making process.

More SOA & App Architecture Reports

Business Intelligence & Information Management

The Ultimate Search Engine
8/6/2007
Google, Microsoft, Yahoo and others are developing next-generation technologies that automate and personalize information search.

Market Analysis: Holistic Application Performance Management
8/6/2007
We kick off our APM Rolling Review with a guide to selecting a suite. Hint: Agents aren't the only gotcha.

Sponsored

More Business Intelligence & Information Management Reports

Mobile & Wireless

A Look at POE Plus
8/20/2007
Power-hungry devices will satiate their appetites with the IEEE's upcoming 802.3at standard.

Rolling Review: Wi-Fi Location
8/17/2007
Using your WLAN to track high-dollar assets and ensure tight security is a smart way to wring value out of an expensive resource. In this Rolling Review we'll issue an RFI to help you get ahead of the curve on location services.

More Mobile & Wireless Reports

Unified Communications

SIP-Based Push-to-Talk Moving Into Enterprise Territory
6/25/2007
SIP Push-to-Talk holds promise of using a VoIP infrastructure to streamline communication with two-way, walkie-talkie-like call functionality.

Certification Shelved for Voice QoS over Wireless
5/25/2007
A lack of support prompts the Wi-Fi Alliance to table a program that would have laid the groundwork for implementation of 802.11e mechanism. But is there still hope for higher voice capacity?

More Unified Communications Reports

Network & Systems Management

Market Analysis: Holistic Application Performance Management
8/6/2007
We kick off our APM Rolling Review with a guide to selecting a suite. Hint: Agents aren't the only gotcha.

DASH Improves Remote Admin
6/11/2007
The DMTF's desktop and mobile architecture for System Hardware aims to help administrators avoid some of the problems of out-of-band management.

More Network & Systems Management Reports

InformationWeek Reports is a collection of downloadable research documents provided by InformationWeek's IT, By IT editorial team that allow IT decision-makers to feel confident in their management of the enterprise, their implementation and deployment decisions, and their adoption of new technologies.

The easy-to-read and -navigate site gives you exclusive access to original reports and whitepapers on topics including network infrastructure, application performance optimization, network access control, network and systems management, security, mobile and wireless, storage and servers, data centers, service-oriented architecture (SOA) and application architecture, messaging and collaboration, unified communications, information management and compliance and governance.

The reports included in this site are designed for IT staff, developers, programmers, and ISVs and will provide data that can lead to more effective technology implementations and deployments, faster return on investment (ROI) and lower total cost of ownership (TCO).