Monday, September 25, 2006

Managing Risk with Open Source Software

Risk Reduction for Open Source Software

According to a survey, by featured analyst firm Gartner, Inc. more than half of IT software implementations don't have the complete safety net of a support and maintenance policy in place. For Open Source software, the situation is worse, because Open Source software usually comes into the company directly from the Internet. Learn how organizations can evaluate their infrastructure support requirements and protect themselves.

New This Week

Protecting Data on Laptops and PDAs

Corporations have an increasing need for their employees to be on the road. The new mobile workforce uses laptop computers and handheld devices such as PDAs to stay connected with the office and keep corporate information close at hand.Once company information leaves the office, it becomes vulnerable to loss or theft however, it seems we hear new reports of missing laptops and PDAs every week and and when these devices contain sensitive personal information - social insurance numbers, credit card numbers, etc. - the consequences are particularly severe

A CEO Perspective: Why Business Process Management Should be Your #1 Priority

A survey, conducted by featured analyst firm Gartner, Inc. of over 1,300 executes reported that business process improvement was the #1 business priority this year. Take note as three executives who have real-world experience share with you their personal perspectives on the BPM market, its related technology, and proven approaches to effective deployments that directly impact corporate KPIs.


Analyst Spotlight



Tony Asaro, Senior Analyst, Enterprise Strategy Group
Mr. Asaro’s expertise covers data protection, data management, storage systems, components and the ESG Lab service. Prior to joining ESG, Tony was the founder and CEO of a storage startup, I/O Integrity develop and CEO of a storage startup, I/O Integrity developing a high performance storage controller on a chip. Tony previously ran marketing and business development for a storage appliance startup, SANgate Systems where he managed all outbound and internal marketing including product management, strategic planning and competitive analysis.

Check out two programs Tony is featured in:
NAS Virtualization: Consolidating Systems at a Logical Level

The emerging market of NAS virtualization is changing storage networking today. Some of the many benefits NAS virtualization can bring to your NAS storage environment include the ability to combine global name space and data movement, aggregate and consolidate file systems, reduce complexities for users, simplify management for IT, improve capacity utilization and performance, and leverage existing NAS investment. To learn more about NAS virtualization and EMC Rainfinity Global File Virtualization, watch this program now.


Intelligent Network Storage: Defining Effective Service and Support

Gain control so you can manage your support activities, anywhere, anytime -- easily maintaining your storage operations with comprehensive self-resolution tools. Tune in now and learn from the pros.

Monday, September 18, 2006

Dealing with Today's Most Sophisticated Security Attacks

The Future of Integrated Threat Management

Every time there’s a new malware issue or new type of attack do you find yourself searching frantically for the best-of-breed technologies to address the situation? If you answered yes you aren’t alone.

CSO Magazine’s Bob Bragdon speaks with experts from Security Insight and CA on how to shift enterprise security management practices from tactical to strategic during this new program. They’ll illustrate how an integrated threat management (ITM) system works by bringing the best components of different types of technologies together to address today’s most sophisticated form of security attacks.


NEW This Week

Solving Desktop Complexity in The Contact Center
Explore the connection between the complex customer service desktop environment and the challenge in delivering a positive customer experience. Additionally, you'll learn how to identify technology trends that are finally bringing relief to customer service organizations.

Total Automation of Networked Devices PC Configuration
Management has emerged from sneaker administration to a highly automated discipline. Few tools embrace the total lifecycle of a networked device. Reducing IT fixed costs, enhancing client security and achieving a high degree of automation of IT administration are the key features to success.

Expert Advice on Effective Security Risk Management
Information security risk management is a complex undertaking. Internal and external threats continue to grow in frequency and complexity and customers and partners rely more on organizations to open their networks. Further patch management time demands are increasing and network access policies are becoming more complicated. Effective risk management is more important than ever before. Learn from the pros.


Analyst Spotlight

Donna Scott, Vice president, Gartner Research

Ms. Scott is a vice president, distinguished analyst in Gartner Research. She is responsible for real-time infrastructure, business availability and business continuity/disaster recovery at Gartner. She focuses on best practices for IT operations management and architecture, end-to-end IT service management and 24x7 availability. See her featured in the