Buying Decisions
-
Getting a handle on Google Cloud Platform options
With a range of options for big data, storage and more, Google Cloud Platform has become the public cloud of choice for many enterprise users. Continue Reading
-
Introduction to unified threat management appliances
Expert Ed Tittel describes unified threat management (UTM) appliances and features, and explains its advantages to organizations of all sizes. Continue Reading
-
A closer look at the Amazon Web Services cloud platform
Before deploying AWS, it's crucial to understand the public cloud provider's options for cloud storage, networking and more. Here's a closer look. Continue Reading
-
Compare the market-leading public cloud providers
With criteria ranging from cost to connectivity, choosing a cloud provider can be tough. Here's how AWS, Google, Microsoft and Rackspace stack up. Continue Reading
-
HP MSA 2040 storage array
The HP MSA 2040 is a rack-mountable modular storage array for SAN environments that includes increased support for virtualization. Continue Reading
-
Which relational DBMS is best for your company?
Database expert Craig S. Mullins examines the top relational database management system software to determine which best fits your organization. Continue Reading
-
EMC VMAX Series storage arrays
The EMC VMAX is a family of SAN arrays designed for enterprise environments requiring large amounts of storage. Continue Reading
-
Criteria for choosing a public cloud provider
When it comes to choosing a public cloud provider, cost is often top of mind. But other factors, such as VM migration, storage and autoscaling, should also be considered. Continue Reading
-
How to create a SAN array request for proposal
This article outlines the areas to consider when comparing products in the SAN market so you can choose the best system for your organization. Continue Reading
-
Four criteria for selecting the right SSL VPN products
SSL VPNs can offer critical protection for enterprise network communications. Expert Karen Scarfone examines the most important criteria for evaluating SSL VPN products. Continue Reading
-
The three enterprise benefits of SSL VPN products
Expert Karen Scarfone outlines the ways SSL VPN products can secure network connections and communications for organizations. Continue Reading
-
Introduction to SSL VPN products in the enterprise
Virtual private networks secure the confidentiality and integrity of network communications. Expert Karen Scarfone explains how SSL VPN products work. Continue Reading
-
How to determine if an in-memory DBMS is right for your company
Database expert Craig S. Mullins examines the pros and cons of the in-memory database management system, and the criteria you should consider during the request-for-proposal and evaluation period. Continue Reading
-
Is all-flash array storage right for you?
All-flash storage arrays are becoming Tier-1 storage for mission-critical data. Find out if all-flash array storage is right for your environment. Continue Reading
-
Symantec Endpoint Encryption: Full disk encryption product overview
Expert Karen Scarfone examines the features of Symantec Endpoint Encryption, a full disk encryption product for Windows laptops, desktops and servers. Continue Reading
-
Sophos SafeGuard: Full disk encryption product overview
Expert Karen Scarfone examines the features of Sophos SafeGuard, a full disk encryption product for laptops, desktops and servers. Continue Reading
-
Microsoft BitLocker: Full disk encryption software overview
Expert Karen Scarfone examines the features of BitLocker, Microsoft's native full disk encryption software for Windows laptops, desktops and servers. Continue Reading
-
McAfee Complete Data Protection: Full disk encryption product overview
Expert Karen Scarfone examines the features of McAfee Complete Data Protection, a full disk encryption product for securing client-side computers and servers. Continue Reading
-
DiskCryptor: Full disk encryption product overview
Expert Karen Scarfone examines the features of DiskCryptor, an open source full disk encryption product for securing client-side computers and servers. Continue Reading
-
Dell Data Protection | Encryption: Full disk encryption product overview
Expert Karen Scarfone examines the features of Dell Data Protection | Encryption, a full disk encryption product for securing client-side devices. Continue Reading
-
Check Point Full Disk Encryption product overview
Expert Karen Scarfone examines the features of Check Point Full Disk Encryption, an FDE product for securing client devices such as laptops and desktops. Continue Reading
-
Apple FileVault 2: Full disk encryption software overview
Expert Karen Scarfone examines the features of Apple's bundled full disk encryption software for Mac OS X, FileVault 2. Continue Reading
-
The top full disk encryption products on the market today
Full disk encryption can be a key component of an enterprise's desktop and laptop security strategy. Here's a look at some of the top FDE products in the industry. Continue Reading
-
Identify the right WAN optimization products for your company
Leading WAN optimization product vendors use a variety of techniques to get the job done. Find out who does what and if it's right for you. Continue Reading
-
Choosing WAN optimization techniques, more is better
When it comes to choosing WAN optimization techniques, more is definitely better. Part two of this three-part series offers up a catalog of optimization options. Continue Reading
-
Before you buy: Finding the right WAN optimization appliance
Picking the right WAN optimization appliance for your environment involves comparing different data reduction methods. Learn how to pinpoint the best option. Continue Reading
-
Hewlett-Packard 3PAR StoreServ 7000 Series Storage Arrays
The HP 3PAR StoreServ 7000 series is a line of storage arrays designed for enterprise SAN environments. Continue Reading
-
Key considerations for determining if a NoSQL DBMS meets your IT needs
NoSQL represents the fastest-growing type of DBMS being adopted today. Is it right for you? Continue Reading
-
Three reasons to deploy security analytics software in the enterprise
Expert Dan Sullivan outlines three use case scenarios for security analytics tools and explains how they can benefit the enterprise. Continue Reading
-
IBM DS8870 Storage Array Platform
IBM's DS8870 is a storage array platform designed for large enterprise SAN environments with mission-critical workloads. Continue Reading
-
Introduction to security analytics tools in the enterprise
Expert Dan Sullivan explains how security analysis and analytics tools work, and how they provide enterprises with valuable information about impending attacks or threats. Continue Reading
-
Four questions to ask before buying a Web application firewall
Web application firewalls are complex products. Expert Brad Causey explains the key criteria enterprises need to consider before investing in a WAF product. Continue Reading
-
Six ways to use wireless intrusion prevention systems in the enterprise
Expert George V. Hulme presents six real-world use cases for the deployment of WIPS to beef up wireless network security in the enterprise. Continue Reading
-
Introduction to wireless intrusion prevention systems in the enterprise
Expert contributor George V. Hulme explains how wireless intrusion prevention systems (WIPS) protect enterprise networks from attacks and prying eyes. Continue Reading
-
What you need to know before buying BI analytics tools
Expert contributor Wayne Kernochan describes the different types of business intelligence analytics tools on the market and how they can benefit corporate strategies and operations. Continue Reading
-
Three things to consider before deploying a next-generation firewall
Expert contributor Mike Villegas outlines the three factors to consider when making the decision to purchase and deploy a next-generation firewall. Continue Reading
-
Key criteria for deciding if a relational DBMS meets your IT needs
For many organizations, a relational database management system will get the job done; others need to keep looking to fulfill their needs. Continue Reading
-
Business-use scenarios for a Web application firewall deployment
Web application firewalls can be a critical security layer for many companies. Expert Brad Causey explains when and how to deploy a WAF in the enterprise. Continue Reading
-
Introduction to Web application firewalls in the enterprise
Expert Brad Causey takes a close look at Web application firewalls, explains how WAF technology can prevent Internet-based attacks from known and unknown applications threats, and offers advice on WAF management and deployment. Continue Reading
-
Comparing the best email encryption software products
Expert Karen Scarfone examines the best email encryption products in the market and offers guidelines to help enterprises determine which ones may be best for their organizations. Continue Reading
-
How to procure email encryption software
Expert contributor Karen Scarfone examines the most important criteria for evaluating email encryption software for deployment within the enterprise. Continue Reading
-
The top multifactor authentication products
Multifactor authentication can be a critical component of an enterprise security strategy. Here's a look at the top MFA products in the industry. Continue Reading
-
The business case for email encryption software
Email encryption is a valuable security tool for enterprises, but where and how should it be deployed? Expert Karen Scarfone outlines specific use cases for email encryption software. Continue Reading
-
The importance of email encryption software in the enterprise
Expert Karen Scarfone explains how email encryption software protects messages and attachments from malfeasance. Continue Reading
-
Amazon Elastic Compute Cloud features explained
AWS EC2 is a cloud service that's easy to use and easy to set up if companies understand its many facets and features. Continue Reading
-
The fundamentals of FDE: Comparing the top full disk encryption products
Expert Karen Scarfone examines the top full disk encryption products to determine which one may be best for your organization. Continue Reading
-
IBM Tivoli software for enterprise system management
IBM Tivoli enterprise system management products are designed to manage all aspects of a data center, including storage, monitoring and automation. Continue Reading
-
Dell OpenManage enterprise system management overview
Dell's OpenManage product suite provides tools and modules to manage both Dell and third-party IT infrastructures. Continue Reading
-
The fundamentals of FDE: Procuring full-disk encryption software
Expert Karen Scarfone examines the most important criteria for evaluating full disk encryption options for deployment within an enterprise. Continue Reading
-
The fundamentals of FDE: The business case for full disk encryption
Expert Karen Scarfone outlines the benefits of FDE to help businesses decide if the storage encryption technology is right for their organization. Continue Reading
-
The fundamentals of FDE: Full disk encryption in the enterprise
Expert Karen Scarfone examines full disk encryption, or FDE, tools and describes how the security technology protects data at rest on a laptop or desktop computer. Continue Reading