5 Stages of Collaborative Technology Adoption

Enterprises adopting collaboration technology go through various stages, according to David Coleman, co-author of "Collaboration 2.0: Technology and Best Practices." To achieve success in this endeavor, it's valuable to know where you stand and where you are going. Here are…

Virtualization in Federal Agencies is Here to Stay

There is no doubt that virtualization is here to stay. According to analysts, business organizations have virtualized on average almost one-quarter of their servers. By 2012, these same analysts expect more than 50% of all servers to run in virtual…

Securing Data-in-Motion with Cisco Ironport and Data Loss Prevention

The Web 2.0 Generation is growing and presents new data security concerns for Network Administrators and Security Officers. Web-Based E-Mail along with sites like Facebook, MySpace and Twitter allow users to easily share information with friends and the world with…

Top 10 Nessus Plugins

For those of you unfamiliar, NESSUS is comprehensive vulnerability scanning program. It is free of charge for personal use in a non-enterprise environment. Its goal is to detect potential vulnerabilities on the tested systems. Our friends over at Tenable Network…

Tapping the Power of Pull

The era of push is now passing. It's been an era in which institutions mobilized resources in advance to the areas of highest anticipated need. In business, we built production facilities and service platforms to deliver resources to a particular…

Identity Management: Securing the Kingdom

At the heart of our endeavors to create dynamic networks that drive collaboration, information sharing and business performance to new levels is the essential concept of identity management. If IT managers are to provide extensive access to the kingdom without…