Security Technology & Operations

Tiered Data Center Organization Enhances Security and Performance

Businesses continue to benefit by offering shared access data centers to partners, suppliers, and clients. The issue in this method of organization is ensuring that each...

IT Leaders: Learn the Laws Covering E-Mail Retention

Confused about which e-mails to retain, and for how long? IT leaders must demand clear guidance from the enterprise. IT can influence retention policy formation by...

Confidentiality and Non-Disclosure Agreement

Non-disclosure agreements (also known as confidentiality agreements) prohibit the communication of certain non-public business information by individuals. Use this...

IT Security 101

IT security is often overlooked and misunderstood by enterprises. Many feel that they have nothing worth stealing and any money spent on security is a wasted investment....

North American Electronic Waste Laws

A number of legislative issues can pose a liability to organizations that fail to properly dispose of obsolete computers and other electronic equipment. Use this document...

E-Discovery: What It Is and How It Affects IT

Electronic evidence is now a major deciding factor in court cases. Understand the mechanics of e-discovery prior to the acquisition or implementation of records...

Network Printers Represent Serious Security Vulnerability

Most large printers, since 2002, contain physical hard drives used to queue up items to be printed, scanned, copied, faxed and e-mailed by the machine. Ensure that your...

Top Level Domain Authorities Implementing DNSSEC

On May 5, 2010 top level domain authorities, such as ICANN, VeriSign, and others will implement the first phase of a DNSSEC (Domain Name System Security Extensions)...

Quick Wins Save 5% Now!

Do you need to make a difference this week? This month? Take a look at these tactics and tools to build your guerilla plan.

Select an E-mail Archiving Solution with Confidence

The e-mail archiving market is a confusing mixture of storage vendors, compliance and e-discovery vendors, security vendors, and e-mail platform vendors. To complicate...
Visit our IT Cost Optimization Center
Over 100 analysts waiting to take your call right now: 1-519-432-3550 x2019
GET HELP
Contact Us