Friday, January 26, 2007

Security Information Management: Insiders Reveal What You Need to Know

A solution that addresses risk management and compliance challenges

Meeting compliance mandates while managing threats is a daunting task. An internal security breach or a hack to your network could cost your company millions and cause a myriad of compliance headaches. How can you make sure the right people have access to the information they need quickly and the wrong people don’t have access to the information at all? Tune in and learn.

New This Week


Delivering More "Service" With IT Service Management

Businesses increasingly rely on their IT departments to drive business objectives, help them reduce costs, while at the same time enhance overall productivity, security and improve customer satisfaction. Watch and learn how IT service management can help your business reach new heights.


Beating Spyware before it beats you

Experts examine the spyware challenges that companies face and, more importantly, the solutions that can solve those challenges. You’ll see why a multi-pronged solution offers the strongest defense against spyware, and why the best cure is stopping symptoms from being introduced in the first place.

Friday, January 12, 2007

Information Servers: Delivering Information You Can Trust

Take Back Control of Your Information Assets With Information Servers

The need to integrate and access disparate information in consistent, trusted and reusable way has become even more critical as enterprises extend their boundaries to encompass global suppliers, partners, and customers. Learn more now.

Friday, January 05, 2007

The growing trend of remote hosting: Is it right for you?

Reduce Medical Errors And Improve Patient Safety With Remote Hosting

Advanced clinical information systems are helping today’s successful healthcare organizations reduce medical errors, optimize care, and increase clinician efficiency. However, the initial capital costs required for upgrades to infrastructure, facilities, staffing and support often put these systems out of reach. As a result, many organizations are turning to remote hosting which offers predictable maintenance costs, reduced staffing, lower technical risks, and most importantly, the ability to focus limited resources on the core business -- patient care.

NEW This Week

Justifying Data at Rest Protection Investment in Your Organization

Protecting data at rest is filled with challenges, ranging from legislative requirements to issues of cost control, ease of use, scalability, performance, and investment protection. So, what is the best solution to protect the confidential and personal data of your company, clients, and partners? Which solution will maximize your investment?

Analyst Spotlight


Jane Disbrow,
Research Director
Gartner Research

Ms. Disbrow is part of the IT Asset Management and Applied Research group. She covers software license agreements, best practices for contract terms and conditions, negotiation strategy, license metrics and software audits.

Watch Jane here:

Protecting Mission Critical Applications with Technology Escrow

What if a software development company, for instance, defaults on its maintenance and support contract? What leverage does the software licensee have to get the technical assistance it needs, especially if the software performs a mission-critical function? Learn why technology escrow plays a key role on any well-crafted technology license agreement.