August 27, 2009 - In large networks, the sheer number of permission settings makes it almost impossible to gain a clear overview of overall security, and checking that all those permission are in compliance with corporate and regulatory standards is a Herculean task.
December 01, 2008 - With more and more sensitive data moving from file servers to SharePoint sites, it's important to keep a close eye on what users can access documents, what users have permissions to change the SharePoint sites, and what documents are getting modified.
August 27, 2009 - It sounds simple, but just try to figure out who accessed your confidential data yesterday. IT management standards insist on it, compliance standards require it, but can you deliver?
August 27, 2009 - With exploits for known vulnerabilities unleashed on the Internet within as little as 5 days from the release of new patches from Microsoft, it is imperative your desktops and servers be regularly updated to keep them safe from attack.
August 27, 2009 - Getting data moved over to a new server is more than merely copying the most recent files and folders to that machine. File security, permissions, shared folders and local groups facilitating access need to be maintained.
August 27, 2009 - Financial records, human resource data, customer profiles and more are just a few of the content types that could get in the wrong hands if the appropriate security controls are not in place.
May 15, 2013 - This e-guide from SearchHealthIT.com offers nine rules every health care facility should follow when adopting virtualized technologies. Uncover the risks and rewards involved with utilizing virtual systems, and learn more about what the future is likely to bring.
June 09, 2009 - This paper outlines the challenges of introducing next generation technology and defines the roles and responsibilities of a prime integrator. The critical elements of 3rd party engagement and management are also defined.
June 01, 2008 - In this paper, The Green Grid provides a framework for improving the energy efficiency of both new and existing datacenters. The nature of datacenter energy consumption is reviewed and best practices are suggested that can significantly impa...
January 26, 2011 - This paper describes and compares three common methods for specifying data center criticality. Guidance is given on how to choose a criticality by presenting typical levels for various applications and environments. Defensible approaches for specifying data center performance are also discussed.
January 01, 2005 - Specifying data center density has yet to conform to an established standard within the industry. This paper describes the science and practical application of an improved method for the specification of power and cooling infrastructure for data centers.
April 01, 2009 - This document is not intended to judge what is good or bad, right or wrong. The primary focus is educational, providing a background on the principles of de-duplication and recommendations to consider in planning an evaluation of de-duplication solutions.
March 25, 2011 - Independent industry security expert Gunnar Peterson provides the analysis and decision support that will enable you make an informed choice when evaluating Security Gateways. This guide describes security architecture capabilities, common business use cases, and deployment considerations.
January 22, 2009 - In this case study you will learn the approach of Gwinnett to team with HP and other business technology leaders to develop and deploy innovative new solutions that promote quality care, cost efficiencies and service continuity.
September 19, 2011 - Gwinnett Medical Center uses the HP storage area network (SAN) to support almost all of its critical clinical and enterprise management applications. Learn how the SAN supports the hospital system’s full range of McKesson applications, including EHR, pharmacy, physician portal, surgical management, PACS and radiology operations.
TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.