Buying Decisions
Email and Messaging Threats spam phishing instant messaging
-
Kony Studio: A mobile app development platform
Kony Studio is a mobile app development platform that allows developers to build native or cross-platform apps using a single JavaScript codebase. Continue Reading
-
Rally Software the go-to ALM tool for Agile developers
Rally Software gives Agile developers an ALM tool that, along with customizable dashboards, offers SAFe training and certification. Continue Reading
-
Polarion Software offers compliance-focused ALM
Polarion Software is a browser-based, ALM platform that offers high traceability functions for enterprises with a regulation focus. Continue Reading
-
Breaking down the Altassian ALM software suite
With JIRA, Confluence, HipChat, Bitbucket and Stash, the Atlassian ALM software suite is for enterprises of all sizes that use Agile methodologies. Continue Reading
-
HP application lifecycle management: What you need to know
The HP application lifecycle management suite, HP ALM, offers on-premises or SaaS ALM tools to enterprises small and large. Continue Reading
-
The best SSL VPN products in the market
SSL VPNs are essential for securing network connections and communications. Here's a look at the best SSL VPN products in the industry. Continue Reading
-
Comparing the best Web application firewalls in the industry
Expert Brad Causey compares the best Web application firewalls on the market across three types of product types: cloud, integrated and appliance. Continue Reading
-
Visual Studio IDE offers many advantages for developers
Microsoft's Visual Studio IDE allows development teams to create apps for multiple Windows 10 mobile and desktop platforms, as well as for iOS and Android. Continue Reading
-
Learn more about the Android Studio IDE from Google
Android Studio IDE from Google allows developers to build apps running on mobile, desktop and other emerging technologies running on Android. Continue Reading
-
Comparing the leading VoIP vendors and their products
Before purchasing a VoIP system, enterprises need to carry out careful research as VoIP vendors offer intricate products with varying capabilities. Continue Reading
-
PeopleSoft ERP suite excels at human capital management
PeopleSoft ERP software aims to help enterprises recruit and retain top talent, while offering financial and supply chain modules. Continue Reading
-
EMC XtremIO storage array
The XtremIO storage array from EMC is an all-flash system that offers scalability and high performance. Continue Reading
-
Introduction to Web fraud detection systems
Expert Ed Tittel explores the purpose of Web fraud detection systems and services, which are designed to reduce the risks inherent in electronic payments and e-commerce. Continue Reading
-
Zoho CRM platform overview
Zoho's cloud-based CRM platform helps businesses manage the key aspects of their customer engagement strategies. Continue Reading
-
Comparing the top database security tools
Expert Ed Tittel examines the strengths and weaknesses of top-rated database security tools -- from database activity monitoring to transparent database encryption -- to help enterprises make the right purchasing decision. Continue Reading
-
HUS VM SAN array platform
The Hitachi Unified Storage VM is a storage array designed for enterprise SAN environments requiring high storage capacities. Continue Reading
-
SAP HANA in-memory DBMS overview
SAP HANA is an in-memory DBMS and application platform designed to handle high transaction rates and complex queries using one data copy. Continue Reading
-
Toshiba IPedge VoIP System Product Overview
The Toshiba IPedge is a secure software-based VoIP system intended to replace legacy telephony. Continue Reading
-
Your key products for enterprise application integration
Tom Nolle helps you determine which EAI software product is most appropriate for your company. Continue Reading
-
Comparing the top wireless intrusion prevention systems
Expert Karen Scarfone examines the top wireless intrusion prevention systems (WIPS) to help readers determine which may be best for them. Continue Reading
-
Redis open source DBMS overview
The Redis open source DBMS provides a highly scalable data store that can be shared by multiple processes, applications or servers. Continue Reading
-
MySQL open source RDBMS overview
Developers, database administrators and DevOps teams use MySQL open source RDBMS to more easily operate next-generation applications in the cloud. Continue Reading
-
Comparing the best UTM products in the industry
Expert Ed Tittel examines the top unified threat management appliances to determine which one could be the best for your organization. Continue Reading
-
Six criteria for purchasing unified threat management appliances
Expert Ed Tittel explores key criteria for evaluating unified threat management (UTM) appliances to determine the best choice for your organization. Continue Reading
-
How UTM products can benefit your enterprise network environment
Expert Ed Tittel explains why unified threat management is the right holistic IT security approach for SMBs and how it can fit into the enterprise, as well. Continue Reading
-
Improving customer engagement strategies with CRM tools
There are several different types of CRM tools that can be used to improve your customer engagement strategies. Continue Reading
-
What you need to know about the ALM methodology
Gerie Owen provides an overview of ALM methodology, covering its requirements, development and maintenance phases and its core components. Continue Reading
-
Tips for creating a data classification policy
Before deploying and implementing a data loss prevention product, enterprises should have an effective data classification policy in place. Expert Bill Hayes explains how that can be done. Continue Reading
-
How to keep track of sensitive data with a data flow map
Expert Bill Hayes describes how to create a data flow map to visualize where sensitive data is processed, how it transits the network and where it's stored. Continue Reading
-
Introduction to database security tools for the enterprise
Expert Adrian Lane explains why database security tools play a significant, if not the majority, role in protecting data in the enterprise data center. Continue Reading
-
Which in-memory DBMS best fits your company's needs?
Database expert Craig S. Mullins examines some top in-memory DBMS software offerings to help you determine which is the best fit for your organization. Continue Reading
-
What are data center-class switches?
Choosing the right switch for your data center can be a difficult task. This article looks at how data center-class switches are evolving in the enterprise to offer flexibility and speed for new traffic flows. Continue Reading
-
Oracle Database 12c relational database management system overview
Oracle Database 12c delivers strong performance for mission-critical workloads, with features and functionality for diverse processing needs and requirements. Continue Reading
-
Workday HCM | HR tools product overview
Workday HCM has a wide breadth of functions aimed at unifying human resource capabilities into a single, easy-to-use system. Continue Reading
-
Six criteria for procuring security analytics software
Security analytics software can be beneficial to enterprises. Expert Dan Sullivan explains how to select the right product to fit your organization's needs. Continue Reading
-
Exploring capabilities, costs of Microsoft Azure cloud
Microsoft Azure targets enterprises that want to connect their existing data centers to the cloud. But is Azure the best bet for your organization? Continue Reading
-
Getting a handle on Google Cloud Platform options
With a range of options for big data, storage and more, Google Cloud Platform has become the public cloud of choice for many enterprise users. Continue Reading
-
Introduction to unified threat management appliances
Expert Ed Tittel describes unified threat management (UTM) appliances and features, and explains its advantages to organizations of all sizes. Continue Reading
-
HP MSA 2040 storage array
The HP MSA 2040 is a rack-mountable modular storage array for SAN environments that includes increased support for virtualization. Continue Reading
-
Which relational DBMS is best for your company?
Database expert Craig S. Mullins examines the top relational database management system software to determine which best fits your organization. Continue Reading
-
EMC VMAX Series storage arrays
The EMC VMAX is a family of SAN arrays designed for enterprise environments requiring large amounts of storage. Continue Reading
-
The three enterprise benefits of SSL VPN products
Expert Karen Scarfone outlines the ways SSL VPN products can secure network connections and communications for organizations. Continue Reading
-
How to determine if an in-memory DBMS is right for your company
Database expert Craig S. Mullins examines the pros and cons of the in-memory database management system, and the criteria you should consider during the request-for-proposal and evaluation period. Continue Reading
-
Symantec Endpoint Encryption: Full disk encryption product overview
Expert Karen Scarfone examines the features of Symantec Endpoint Encryption, a full disk encryption product for Windows laptops, desktops and servers. Continue Reading
-
Sophos SafeGuard: Full disk encryption product overview
Expert Karen Scarfone examines the features of Sophos SafeGuard, a full disk encryption product for laptops, desktops and servers. Continue Reading
-
Microsoft BitLocker: Full disk encryption software overview
Expert Karen Scarfone examines the features of BitLocker, Microsoft's native full disk encryption software for Windows laptops, desktops and servers. Continue Reading
-
McAfee Complete Data Protection: Full disk encryption product overview
Expert Karen Scarfone examines the features of McAfee Complete Data Protection, a full disk encryption product for securing client-side computers and servers. Continue Reading
-
Dell Data Protection | Encryption: Full disk encryption product overview
Expert Karen Scarfone examines the features of Dell Data Protection | Encryption, a full disk encryption product for securing client-side devices. Continue Reading
-
Check Point Full Disk Encryption product overview
Expert Karen Scarfone examines the features of Check Point Full Disk Encryption, an FDE product for securing client devices such as laptops and desktops. Continue Reading
-
Apple FileVault 2: Full disk encryption software overview
Expert Karen Scarfone examines the features of Apple's bundled full disk encryption software for Mac OS X, FileVault 2. Continue Reading
-
The top full disk encryption products on the market today
Full disk encryption can be a key component of an enterprise's desktop and laptop security strategy. Here's a look at some of the top FDE products in the industry. Continue Reading
-
Hewlett-Packard 3PAR StoreServ 7000 Series Storage Arrays
The HP 3PAR StoreServ 7000 series is a line of storage arrays designed for enterprise SAN environments. Continue Reading
-
Key considerations for determining if a NoSQL DBMS meets your IT needs
NoSQL represents the fastest-growing type of DBMS being adopted today. Is it right for you? Continue Reading
-
Introduction to security analytics tools in the enterprise
Expert Dan Sullivan explains how security analysis and analytics tools work, and how they provide enterprises with valuable information about impending attacks or threats. Continue Reading
-
Four questions to ask before buying a Web application firewall
Web application firewalls are complex products. Expert Brad Causey explains the key criteria enterprises need to consider before investing in a WAF product. Continue Reading
-
Six ways to use wireless intrusion prevention systems in the enterprise
Expert George V. Hulme presents six real-world use cases for the deployment of WIPS to beef up wireless network security in the enterprise. Continue Reading
-
Introduction to wireless intrusion prevention systems in the enterprise
Expert contributor George V. Hulme explains how wireless intrusion prevention systems (WIPS) protect enterprise networks from attacks and prying eyes. Continue Reading
-
Key criteria for deciding if a relational DBMS meets your IT needs
For many organizations, a relational database management system will get the job done; others need to keep looking to fulfill their needs. Continue Reading
-
Business-use scenarios for a Web application firewall deployment
Web application firewalls can be a critical security layer for many companies. Expert Brad Causey explains when and how to deploy a WAF in the enterprise. Continue Reading
-
Introduction to Web application firewalls in the enterprise
Expert Brad Causey takes a close look at Web application firewalls, explains how WAF technology can prevent Internet-based attacks from known and unknown applications threats, and offers advice on WAF management and deployment. Continue Reading
-
The top multifactor authentication products
Multifactor authentication can be a critical component of an enterprise security strategy. Here's a look at the top MFA products in the industry. Continue Reading
-
The importance of email encryption software in the enterprise
Expert Karen Scarfone explains how email encryption software protects messages and attachments from malfeasance. Continue Reading
-
Amazon Elastic Compute Cloud features explained
AWS EC2 is a cloud service that's easy to use and easy to set up if companies understand its many facets and features. Continue Reading
-
The fundamentals of FDE: Comparing the top full disk encryption products
Expert Karen Scarfone examines the top full disk encryption products to determine which one may be best for your organization. Continue Reading
-
IBM Tivoli software for enterprise system management
IBM Tivoli enterprise system management products are designed to manage all aspects of a data center, including storage, monitoring and automation. Continue Reading
-
Dell OpenManage enterprise system management overview
Dell's OpenManage product suite provides tools and modules to manage both Dell and third-party IT infrastructures. Continue Reading
-
The fundamentals of FDE: Procuring full-disk encryption software
Expert Karen Scarfone examines the most important criteria for evaluating full disk encryption options for deployment within an enterprise. Continue Reading
-
The fundamentals of FDE: The business case for full disk encryption
Expert Karen Scarfone outlines the benefits of FDE to help businesses decide if the storage encryption technology is right for their organization. Continue Reading
-
The fundamentals of FDE: Full disk encryption in the enterprise
Expert Karen Scarfone examines full disk encryption, or FDE, tools and describes how the security technology protects data at rest on a laptop or desktop computer. Continue Reading