These five capabilities of Security Accounts Manager, which is built into Windows, can help IT manage and enforce enterprise password management.
One step forward, two steps back: If you plan to revert Windows 8 to Windows 7, you'll need to consider licensing, software compatibility and more.
Enterprise laptops are easily lost, stolen or compromised, so a mobile security policy should address how they access data and enterprise networks.
After finding success with cloud-based IT Service Management, the University of Miami is emboldened to carry out a cloud-first approach to IT needs.
In this CIO Innovator Q&A, University of Miami's Deputy CIO tells how a drive for IT centralization led to a transformative cloud-first IT strategy.
Smart process applications were the focus of November's 'CIO Decisions' e-zine. What do CIOs say about this new breed of apps and other technologies?
The line between DaaS and VDI is becoming more and more blurred going into 2014.
Whether your VDI implementation is based on Citrix or VMware, certain load-balancing techniques will keep performance on target.
DaaS is no longer the red-headed stepchild of VDI; with VMware and Amazon offering cloud desktops and fostering acceptance, DaaS could gain steam in 2014.
Silver Peak targets firms with hybrid networks and with features that automatically determine better-performing links through which to send traffic.
Read valuable expert advice about what causes IP address conflicts, and learn how to detect duplicate IP addresses in this tip.
Relational databases have their role, but retrieving NetFlow analysis data efficiently isn't necessarily one of them. Instead, try NoSQL reporting.
Get familiar with the details and use these four steps to lock down hosts in your VMware virtualized environment.
Using VMware vCenter roles can eliminate security concerns while giving IT teams the access they need.
Pulling up stakes and putting your servers into the cloud doesn't mean you won't be able to access your virtual machines.
A new website built by Troy Hunt enables possible data breach victims to discover compromised accounts from several high-profile breaches.
With the CISO role being a new addition for many executive teams, expert Joe Granneman says there are several challenges facing security execs.
Expert Nick Lewis details why antimalware suites don't provide adequate protection against Web-based malware and how enterprises can defend users.
Employee social networks: Improving collaboration and solving problems together? Or a giant waste of time? Read how one call center made it work.
Salesforce apps can be vital to small businesses with tight budgets. Find out some other reasons they are so important to some small businesses.
Social media and analytics have changed customer expectations for deeper relationships with vendors. Salesforce lead generation is up to the task.