Buying Decisions
-
Splunk Enterprise Security: Product overview
Expert Dan Sullivan explores how Splunk Enterprise Security uses big data security analytics to incorporate multiple methods of data integration to identify malicious events. Continue Reading
-
Five scenarios where WMS technology can help your organization
From distribution center and warehouses globalizing, to omnichannel strategies and manufacturing software integration, WMS technology solves many needs in the warehouse. Continue Reading
-
Examining the top data governance tools on the market
Expert John Ladley examines the leading data governance software products, comparing and contrasting their features to help you determine which tool will best meet your needs. Continue Reading
-
CFEngine configuration management tool up close and in-depth
CFEngine is a widely known and used configuration management tool. Learn about its primary features and functions and if and how your organization could benefit from it. Continue Reading
-
Inside Docker configuration management functions
Docker may not be a standard configuration management tool, but it possesses a set of capabilities that have made it a growing player in the CM market. Continue Reading
-
The Cobbler configuration management tool's ins and outs
Cobbler is a configuration management tool best suited for Linux-based IT environments. Learn more about this tool and if it can benefit your enterprise. Continue Reading
-
Alation Data Catalog helps provide collaborative data governance
Alation Data Catalog provides business analysts and data stewards with search and discovery, governance and collaboration functionality, and automates many data governance tasks. Continue Reading
-
RSA NetWitness Logs and Packets: Security analytics product overview
Expert Dan Sullivan examines RSA's NetWitness Logs and Packets, security analytics tools that collect and review logs, packets and behavior to detect enterprise threats. Continue Reading
-
SaltStack configuration management tools and their many functions
SaltStack is a relatively new tool in the configuration management market with powerful capabilities and an active user community. Read more about this emerging product here. Continue Reading
-
JDA's WMS technology integrates with virtually any ERP system
JDA provides WMS technology that helps organizations manage all aspects of their warehouses, including people, products, space and equipment. Continue Reading
-
What Chef configuration management can do for your IT systems
Chef configuration management tools possess a huge community of users. Learn more about product versions, capabilities, user resources and what Chef can offer an enterprise. Continue Reading
-
Select the best configuration management tools for your company
What characterizes the best configuration management tools for your company? Read about the different tools available and which ones would address your company needs the best. Continue Reading
-
Use WMS software to manage your warehouse and streamline operations
As customers' demands and expectations for quicker delivery times grow, see why WMS software has become an important technology to help organizations become more efficient. Continue Reading
-
What you should know about Collibra Data Governance Center
Collibra Data Governance Center is a repository- and workflow-oriented data governance platform that also offers features for data management and data stewardship. Continue Reading
-
Blue Coat DLP: Data loss prevention product overview
Expert Bill Hayes takes a look at Blue Coat DLP, a single appliance data loss prevention system that works with the company's web security gateway products. Continue Reading
-
How to narrow down your choices for buying a data governance tool
Evaluating and selecting a data governance tool depends on not only features and functionality, but also how you will use the tool to add value to your organization. Continue Reading
-
Blue Coat Security Analytics Platform: Product overview
Expert Dan Sullivan takes a look at the Blue Coat Security Analytics Platform, which is designed to capture comprehensive network information and apply targeted security analytics. Continue Reading
-
WinMagic SecureDoc: Full-disk encryption product overview
Expert Karen Scarfone examines the features of WinMagic's SecureDoc, a full-disk encryption product for laptops, desktops, mobile devices and servers. Continue Reading
-
ScienceLogic EM7: Network performance monitor overview
ScienceLogic EM7 is still a newcomer to the network performance monitoring market, but it offers flexible deployment options, including VMs and software-as-a-service installations. Continue Reading
-
Mojo AirTight WIPS overview
Expert Karen Scarfone looks at the features and functionality of Mojo Networks' AirTight WIPS, a wireless intrusion prevention system designed to detect and block WLAN attacks. Continue Reading
-
The business case for video conference technology just got easier
Use cases for video conference technology have transformed recently, as the software-as-a-service model provides greater flexibility, lower cost of ownership and easier deployments. Continue Reading
-
Exploring the features of Oracle Enterprise Manager 13c
Cloud Control, a feature of Oracle Enterprise Manager 13c, can be used to monitor and manage databases, middleware, infrastructure and hardware running on-premises or in the cloud. Continue Reading
-
Inside BMC's database performance tools for DB2 for z/OS
BMC offers several tools to help DBAs manage and prevent critical performance issues in DB2 for z/OS, as well as monitoring options for other vital mainframe subsystems. Continue Reading
-
Inside the SAP Data Services data integration tool
SAP Data Services can be used alone or with other SAP products to provide data integration, transformation, data quality, data profiling and text data processing. Continue Reading
-
An overview of the Pentaho Data Integration platform
The Pentaho Data Integration platform enables organizations to integrate, blend, convert and transform data from any data source across their entire enterprise. Continue Reading
-
Aruba RFProtect WIPS: Product overview
Expert Karen Scarfone examines the features of Aruba RFProtect, a wireless intrusion prevention system to detect and block WLAN attacks against enterprise networks. Continue Reading
-
Explore SciQuest source-to-settle e-procurement software
SciQuest has an array of source-to-settle applications, containing its e-procurement software Spend Director, so customers can decide which modules fit their organization best. Continue Reading
-
Infor CloudSuite offers a modular cloud ERP system
As a flexible cloud ERP system, Infor CloudSuite provides lots of options for its users with how it's deployed in the cloud and how it's configured for organizations' needs. Continue Reading
-
Oracle ERP Cloud is tailored for businesses of all sizes and verticals
The full-fledged, flexible Oracle ERP Cloud lets enterprises of all sizes pick and choose the most relevant ERP module that fits their organizational needs. Continue Reading
-
Check Point Next Generation Firewall: Product overview
Check Point Next Generation Firewall family combines firewalls with unified threat management technology, VPNs and more. Expert Mike O. Villegas takes a closer look. Continue Reading
-
Cisco ASA with FirePOWER: NGFW product overview
Cisco combined the ASA series firewall with SourceFire's FirePOWER threat and malware detection capabilities. Expert Mike O. Villegas takes a closer look at this NGFW. Continue Reading
-
Examining the functions and features of database performance tools
To help you determine which tools your organization needs, it's important to review the primary features and functionality of the three database performance tools categories. Continue Reading
-
Save employees' time with the Coupa Procurement System
Coupa's spend management suite contains the Coupa Procurement System that allows companies and its employees to save money and maximize efficiency with e-commerce shopping. Continue Reading
-
IFS Applications provides enterprises full-fledged cloud ERP software
Deployed on premises, in the cloud or as a hybrid, IFS Applications is a well-rounded and well-supported cloud ERP software suite. Continue Reading
-
Three indicators that could signal database performance issues
Database performance monitoring and management tools can be used to mitigate issues and help organizations be more proactive, so they can avoid performance problems and outages. Continue Reading
-
What you need to know about Oracle Data Integrator 12c
Oracle Data Integrator 12c works with several other Oracle products to leverage the capabilities of RDBMSs for processing and transforming data. Continue Reading
-
Key considerations for choosing your e-procurement software
Deciding on an e-procurement software package requires careful evaluation of your needs. We detail key requirements to help you better understand the options available to you. Continue Reading
-
What you need to know about database performance software
Database performance software identifies bottlenecks and points of contention, monitors workload and throughput, and manages system and DBMS resource usage. Continue Reading
-
Inside the MapR Hadoop distribution for managing big data
The MapR Hadoop distribution replaces HDFS with its proprietary file system, MapR-FS, which is designed to provide more efficient management of data, reliability and ease of use. Continue Reading
-
What to know about the IBM Information Governance Catalog
IBM's Information Governance Catalog provides organizations with a workflow-oriented data governance tool for organizing, managing and accessing their data assets. Continue Reading
-
Voltage SecureMail encryption tool: Product overview
Expert contributor Karen Scarfone takes a look at Voltage SecureMail for encrypting email messages in the enterprise. Continue Reading
-
Symantec Desktop Email Encryption: Product overview
Expert contributor Karen Scarfone examines Symantec Desktop Email Encryption, a tool for encrypting email messages for individuals within the enterprise. Continue Reading
-
Five factors to help select the right data warehouse product
How big is your company, and what resources does it have? What are your performance needs? Answering these questions and others can help you select the right data warehouse platform. Continue Reading
-
Microsoft TFS is here for your QA and test management needs
Microsoft TFS offers organizations test management software, which integrates with Visual Studio to help improve communication when putting together software. Continue Reading
-
Clover: A code coverage tool that provides meaningful metrics
For organizations looking to augment their software quality assurance testing process, look no further than Atlassian's code coverage tool, Clover. Continue Reading
-
A look inside the SAP IQ column-oriented database
The SAP IQ column-oriented database is designed for large data warehouses that require high scalability, rapid data loading and optimal query performance. Continue Reading
-
Examining the Teradata Data Warehouse
With both relational and columnar options, the Teradata Active Enterprise Data Warehouse gives companies an efficient, scalable appliance they can deploy in-house or in the cloud. Continue Reading
-
Comparing the best network access control products
Expert Rob Shapland takes a look at the best network access control products on the market today and examines the features and capabilities that distinguish the top vendors in this space. Continue Reading
-
Evaluating the key features of data warehouse platforms
Choosing between the different types of data warehouse platforms can be simplified once you know which deployment option best meets your project requirements. Continue Reading
-
Comparing the top big data security analytics tools
Expert Dan Sullivan compares how the top-rated big data security analytics tools measure up against each other to help you select the right one for your organization. Continue Reading
-
What to expect from Oracle Exadata Database Machine
Oracle Exadata Database Machine combines hardware and software to enable analytics, batch, reporting and other tasks to run simultaneously within and across databases. Continue Reading
-
How to use Bugzilla bug tracking tool in software testing projects
The Bugzilla bug tracking tool allows DevOps teams to collaborate and report on defects present in apps and software projects in one interactive location. Continue Reading
-
Examining the IBM PureData System for Analytics appliance
Powered by Netezza technology, the IBM PureData System for Analytics data warehouse appliance enables users to execute complex queries and get results quickly. Continue Reading
-
Comparing the top vulnerability management tools
Expert Ed Tittel compares how the top-rated vulnerability management tools measure up against each other so you can select the right one for your organization. Continue Reading
-
Unify OpenScape Voice: Product overview
With support for mobility, video and scalability for up to 500,000 users, OpenScape Voice -- and the rest of the Unify UC portfolio -- is well-suited for large enterprises. Continue Reading
-
Fortinet FortiGate UTM: Product overview
Expert Ed Tittel looks at Fortinet FortiGate UTM appliances, which combine different network infrastructure protection features into a single device. Continue Reading
-
Cisco Meraki MX appliances: UTM product overview
Expert Ed Tittel examines Cisco's Meraki MX UTM Appliances, a series of UTM products that combines various network security and protection features into a single device. Continue Reading
-
Check Point UTM Threat Prevention Appliances: Product review
Check Point UTM Threat Prevention Appliances are recognized by our reviewer as consistent software architectures that are easy to configure. Continue Reading
-
Seven criteria for buying vulnerability management tools
Expert contributor Ed Tittel describes purchasing criteria for full-featured vulnerability management tools for small organizations to large enterprises. Continue Reading
-
The business case for vulnerability management tools
Expert Ed Tittel describes business use cases for vulnerability management tools and examines how organizations of all sizes benefit from these products. Continue Reading
-
Introduction to vulnerability management tools
Expert Ed Tittel explores how vulnerability management tools can help organizations of all sizes uncover defense weaknesses and close security gaps before they are exploited by attackers. Continue Reading
-
Symantec Messaging Gateway and Symantec Email Security.cloud: Product overview
Expert Karen Scarfone examines the Symantec Messaging Gateway and Symantec Email Security.cloud email security gateway products that detects and blocks messages that contain suspicious content and threats. Continue Reading
-
Proofpoint Enterprise Protection: Product overview
Expert Karen Scarfone examines the Proofpoint Enterprise Protection email security gateway product, which scans inbound and outbound email messages for malware, phishing and spam threats. Continue Reading
-
McAfee Email Protection, Security for Email Servers: Product overview
Expert Karen Scarfone reviews the McAfee Email Protection and McAfee Security for Email Servers products that are used for monitoring, blocking and quarantining email messages. Continue Reading
-
Clearswift SECURE Email Gateway: Product overview
Expert Karen Scarfone reviews the Clearswift SECURE Email Gateway product, which monitors incoming and outgoing emails. Continue Reading
-
Fortinet FortiMail: Product overview
Expert Karen Scarfone reviews the Fortinet FortiMail email security gateway product that is used for monitoring email messages on behalf of an organization. Continue Reading
-
Avaya UC product overview: Aura Communication Manager
The Avaya Aura Platform, perhaps best suited for larger enterprises, supports messaging, voice, video, presence and mobility features, as well as virtualization. Continue Reading
-
A look at SAP BusinessObjects BI suite
SAP BusinessObjects BI platform provides users with self-service access to information to support the decision-making process. Find out what's different in version 4.1. Continue Reading
-
Cisco Email Security Appliance: Product overview
Expert Karen Scarfone reviews Cisco's Email Security Appliance product that is designed for detecting and blocking email-borne threats. Continue Reading
-
Exploring Microsoft Power BI SaaS analytics products
Microsoft Power BI SaaS analytics lets users view their most critical data via a live dashboard, create interactive reports and access their data on the go. Continue Reading
-
What can PLM technology do for enterprises?
Product lifecycle management can be an opaque topic. Here's help understanding exactly what PLM technology is and how it can help your company innovate. Continue Reading
-
Oracle ZFS Storage Appliance system overview
Oracle ZFS Storage uses mechanical and flash storage. The ZS3-2 and ZS4-4 models offer a variety of software for storage management, encryption and security. Continue Reading
-
Hewlett Packard Enterprise's ArcSight ESM: SIEM product overview
Expert Karen Scarfone analyzes HPE's ArcSight Enterprise Security Management (ESM), a security information and event management (SIEM) tool used for collecting security log data. Continue Reading
-
EMC RSA Security Analytics: SIEM product overview
Expert Karen Scarfone examines EMC RSA Security Analytics, a SIEM product for harvesting, analyzing and reporting on security log data across the enterprise. Continue Reading
-
AlienVault OSSIM: SIEM Product overview
Expert Karen Scarfone checks out AlienVault's Open Source SIEM and Unified Security Management products for collecting event data from various security logs within an organization. Continue Reading
-
Splunk Enterprise: SIEM product overview
Expert Karen Scarfone examines Splunk Enterprise, a security information and event management (SIEM) product for collecting and analyzing event data to identify malicious activity. Continue Reading
-
SolarWinds Log and Event Manager: SIEM product overview
Expert Karen Scarfone examines SolarWinds Log and Event Manager, a security information and event management (SIEM) tool for collecting and analyzing event data to identify malicious activity. Continue Reading
-
IBM Security QRadar: SIEM product overview
Expert Karen Scarfone takes a look at IBM Security QRadar, a security information and event management (SIEM) tool used for collecting and analyzing security log data. Continue Reading
-
LogRhythm's Security Intelligence Platform: SIEM product overview
Expert Karen Scarfone examines LogRhythm's Security Intelligence Platform, a SIEM tool for analyzing collected data. Continue Reading
-
Introduction to big data security analytics in the enterprise
Expert Dan Sullivan explains what big data security analytics is and how these tools are applied to security monitoring to enable broader and more in-depth event analysis for better enterprise protection. Continue Reading
-
The benefits of deploying a data warehouse platform
Big data may be all the rage, but data warehouse platforms are still being utilized by companies of all sizes. Expert Craig S. Mullins takes a look at the technology. Continue Reading
-
Blue Coat ProxySG: Secure Web gateway overview
With features like authentication and Web filtering, the Blue Coat ProxySG secure Web gateway can be deployed as a physical appliance, a virtual machine or a cloud-based service. Continue Reading
-
Comparing the best intrusion prevention systems
Expert contributor Karen Scarfone examines the best intrusion prevention systems to help you determine which IPS products may be best for your organization. Continue Reading
-
Palo Alto WildFire: Malware sandbox product overview
Tightly integrated with existing Palo Alto next-generation firewalls, the Palo Alto WildFire cloud-based malware sandbox service supports both public and private cloud deployments. Continue Reading
-
Hitachi NAS platform 4000 overview
The Hitachi NAS platform 4000 series consists of four product models that use a discrete controller that can be attached to almost any Hitachi storage system. Continue Reading
-
Comparing the top Web fraud detection systems
Expert Ed Tittel explores the features of the top Web fraud detection systems and compares critical purchasing criteria. Continue Reading
-
What to expect from the Salesforce Sales Cloud platform
Salesforce Sales Cloud is a CRM platform featuring a number of sales and CRM tools, which help businesses of all sizes manage their B2B and B2C engagement and sales strategies. Continue Reading
-
Three criteria for selecting the right IPS products
Expert contributor Karen Scarfone examines important criteria for evaluating intrusion prevention system (IPS) products for use by an organization. Continue Reading
-
Vormetric Transparent Encryption: Product overview
Expert Ed Tittel takes a look at Vormetric Transparent Encryption, a component of Vormetric's Data Security Platform that encrypts data and does access control for that data. Continue Reading
-
HP Security Voltage's SecureData Enterprise: Product overview
Expert Ed Tittel examines SecureData Enterprise, which is a part of the HP Security Voltage platform, a scalable database security product that encrypts both structured and unstructured data, tokenizing data to prevent viewing and more. Continue Reading
-
Protegrity Database Protector: Database security tool overview
Expert Ed Tittel examines Protegrity Database Protector, a database security add-on product that provides column- and field-level protection of confidential and sensitive data stored in nearly any type of relational database. Continue Reading
-
Oracle Advanced Security: Database security tool overview
Expert Ed Tittel examines Oracle Advanced Security, a database security add-on product with transparent data encryption (TDE) and data redaction features. Continue Reading
-
McAfee Database Activity Monitoring: Database security tool overview
Expert Ed Tittel takes a look at McAfee Database Activity Monitoring and McAfee Vulnerability Manager for Databases to see how they protect enterprises' databases and corporate data. Continue Reading
-
Imperva SecureSphere: Database security tool overview
Expert Ed Tittel examines Imperva SecureSphere Database Activity Monitoring and Database Assessment, products that are deployed as an inline bridge or as a lightweight agent to assess and monitor local database access. Continue Reading
-
IBM Guardium: Database security tool overview
Expert Ed Tittel examines IBM Guardium, a security product that offers continuous, real-time, policy-based monitoring of database activities. Continue Reading
-
Enterprise benefits of network intrusion prevention systems
Expert Karen Scarfone explains how most organizations can benefit from intrusion prevention systems (IPSes), specifically dedicated hardware and software IPS technologies. Continue Reading
-
Mitel VoIP 3300 series controllers: Product overview
The Mitel VoIP platform consists of the 3300 series controllers. With support for up to 2,000 SIP trunks, the 3300 series can replace legacy telephony in small or large businesses. Continue Reading
-
ShoreTel phone system: Product overview
The ShoreTel VoIP system boasts several voice switches, simplified administration and automated backup. The premises platform is ShoreTel's replacement for PBX telephony. Continue Reading
-
The basics of network intrusion prevention systems
Expert Karen Scarfone explores intrusion prevention systems and their acquisition, deployment and management within the enterprise. Continue Reading
-
Cisco UCM voice over IP system: Product overview
Designed for small and medium businesses, as well as large enterprises, Cisco UCM provides voice over IP technology that can replace a legacy telephone system. Continue Reading