Buying Decisions
- 
					What you should know about Collibra Data Governance CenterCollibra Data Governance Center is a repository- and workflow-oriented data governance platform that also offers features for data management and data stewardship. Continue Reading 
- 
					Blue Coat DLP: Data loss prevention product overviewExpert Bill Hayes takes a look at Blue Coat DLP, a single appliance data loss prevention system that works with the company's web security gateway products. Continue Reading 
- 
					How to narrow down your choices for buying a data governance toolEvaluating and selecting a data governance tool depends on not only features and functionality, but also how you will use the tool to add value to your organization. Continue Reading 
- 
					Blue Coat Security Analytics Platform: Product overviewExpert Dan Sullivan takes a look at the Blue Coat Security Analytics Platform, which is designed to capture comprehensive network information and apply targeted security analytics. Continue Reading 
- 
					WinMagic SecureDoc: Full-disk encryption product overviewExpert Karen Scarfone examines the features of WinMagic's SecureDoc, a full-disk encryption product for laptops, desktops, mobile devices and servers. Continue Reading 
- 
					ScienceLogic EM7: Network performance monitor overviewScienceLogic EM7 is still a newcomer to the network performance monitoring market, but it offers flexible deployment options, including VMs and software-as-a-service installations. Continue Reading 
- 
					Mojo AirTight WIPS overviewExpert Karen Scarfone looks at the features and functionality of Mojo Networks' AirTight WIPS, a wireless intrusion prevention system designed to detect and block WLAN attacks. Continue Reading 
- 
					The business case for video conference technology just got easierUse cases for video conference technology have transformed recently, as the software-as-a-service model provides greater flexibility, lower cost of ownership and easier deployments. Continue Reading 
- 
					Exploring the features of Oracle Enterprise Manager 13cCloud Control, a feature of Oracle Enterprise Manager 13c, can be used to monitor and manage databases, middleware, infrastructure and hardware running on-premises or in the cloud. Continue Reading 
- 
					Inside BMC's database performance tools for DB2 for z/OSBMC offers several tools to help DBAs manage and prevent critical performance issues in DB2 for z/OS, as well as monitoring options for other vital mainframe subsystems. Continue Reading 
- 
					Inside the SAP Data Services data integration toolSAP Data Services can be used alone or with other SAP products to provide data integration, transformation, data quality, data profiling and text data processing. Continue Reading 
- 
					An overview of the Pentaho Data Integration platformThe Pentaho Data Integration platform enables organizations to integrate, blend, convert and transform data from any data source across their entire enterprise. Continue Reading 
- 
					Aruba RFProtect WIPS: Product overviewExpert Karen Scarfone examines the features of Aruba RFProtect, a wireless intrusion prevention system to detect and block WLAN attacks against enterprise networks. Continue Reading 
- 
					Explore SciQuest source-to-settle e-procurement softwareSciQuest has an array of source-to-settle applications, containing its e-procurement software Spend Director, so customers can decide which modules fit their organization best. Continue Reading 
- 
					Infor CloudSuite offers a modular cloud ERP systemAs a flexible cloud ERP system, Infor CloudSuite provides lots of options for its users with how it's deployed in the cloud and how it's configured for organizations' needs. Continue Reading 
- 
					Oracle ERP Cloud is tailored for businesses of all sizes and verticalsThe full-fledged, flexible Oracle ERP Cloud lets enterprises of all sizes pick and choose the most relevant ERP module that fits their organizational needs. Continue Reading 
- 
					Check Point Next Generation Firewall: Product overviewCheck Point Next Generation Firewall family combines firewalls with unified threat management technology, VPNs and more. Expert Mike O. Villegas takes a closer look. Continue Reading 
- 
					Cisco ASA with FirePOWER: NGFW product overviewCisco combined the ASA series firewall with SourceFire's FirePOWER threat and malware detection capabilities. Expert Mike O. Villegas takes a closer look at this NGFW. Continue Reading 
- 
					Examining the functions and features of database performance toolsTo help you determine which tools your organization needs, it's important to review the primary features and functionality of the three database performance tools categories. Continue Reading 
- 
					Save employees' time with the Coupa Procurement SystemCoupa's spend management suite contains the Coupa Procurement System that allows companies and its employees to save money and maximize efficiency with e-commerce shopping. Continue Reading 
- 
					IFS Applications provides enterprises full-fledged cloud ERP softwareDeployed on premises, in the cloud or as a hybrid, IFS Applications is a well-rounded and well-supported cloud ERP software suite. Continue Reading 
- 
					Three indicators that could signal database performance issuesDatabase performance monitoring and management tools can be used to mitigate issues and help organizations be more proactive, so they can avoid performance problems and outages. Continue Reading 
- 
					What you need to know about Oracle Data Integrator 12cOracle Data Integrator 12c works with several other Oracle products to leverage the capabilities of RDBMSs for processing and transforming data. Continue Reading 
- 
					Key considerations for choosing your e-procurement softwareDeciding on an e-procurement software package requires careful evaluation of your needs. We detail key requirements to help you better understand the options available to you. Continue Reading 
- 
					What you need to know about database performance softwareDatabase performance software identifies bottlenecks and points of contention, monitors workload and throughput, and manages system and DBMS resource usage. Continue Reading 
- 
					Inside the MapR Hadoop distribution for managing big dataThe MapR Hadoop distribution replaces HDFS with its proprietary file system, MapR-FS, which is designed to provide more efficient management of data, reliability and ease of use. Continue Reading 
- 
					What to know about the IBM Information Governance CatalogIBM's Information Governance Catalog provides organizations with a workflow-oriented data governance tool for organizing, managing and accessing their data assets. Continue Reading 
- 
					Voltage SecureMail encryption tool: Product overviewExpert contributor Karen Scarfone takes a look at Voltage SecureMail for encrypting email messages in the enterprise. Continue Reading 
- 
					Symantec Desktop Email Encryption: Product overviewExpert contributor Karen Scarfone examines Symantec Desktop Email Encryption, a tool for encrypting email messages for individuals within the enterprise. Continue Reading 
- 
					Five factors to help select the right data warehouse productHow big is your company, and what resources does it have? What are your performance needs? Answering these questions and others can help you select the right data warehouse platform. Continue Reading 
- 
					Microsoft TFS is here for your QA and test management needsMicrosoft TFS offers organizations test management software, which integrates with Visual Studio to help improve communication when putting together software. Continue Reading 
- 
					Clover: A code coverage tool that provides meaningful metricsFor organizations looking to augment their software quality assurance testing process, look no further than Atlassian's code coverage tool, Clover. Continue Reading 
- 
					A look inside the SAP IQ column-oriented databaseThe SAP IQ column-oriented database is designed for large data warehouses that require high scalability, rapid data loading and optimal query performance. Continue Reading 
- 
					Examining the Teradata Data WarehouseWith both relational and columnar options, the Teradata Active Enterprise Data Warehouse gives companies an efficient, scalable appliance they can deploy in-house or in the cloud. Continue Reading 
- 
					Comparing the best network access control productsExpert Rob Shapland takes a look at the best network access control products on the market today and examines the features and capabilities that distinguish the top vendors in this space. Continue Reading 
- 
					Evaluating the key features of data warehouse platformsChoosing between the different types of data warehouse platforms can be simplified once you know which deployment option best meets your project requirements. Continue Reading 
- 
					Comparing the top big data security analytics toolsExpert Dan Sullivan compares how the top-rated big data security analytics tools measure up against each other to help you select the right one for your organization. Continue Reading 
- 
					What to expect from Oracle Exadata Database MachineOracle Exadata Database Machine combines hardware and software to enable analytics, batch, reporting and other tasks to run simultaneously within and across databases. Continue Reading 
- 
					How to use Bugzilla bug tracking tool in software testing projectsThe Bugzilla bug tracking tool allows DevOps teams to collaborate and report on defects present in apps and software projects in one interactive location. Continue Reading 
- 
					Examining the IBM PureData System for Analytics appliancePowered by Netezza technology, the IBM PureData System for Analytics data warehouse appliance enables users to execute complex queries and get results quickly. Continue Reading 
- 
					Comparing the top vulnerability management toolsExpert Ed Tittel compares how the top-rated vulnerability management tools measure up against each other so you can select the right one for your organization. Continue Reading 
- 
					Unify OpenScape Voice: Product overviewWith support for mobility, video and scalability for up to 500,000 users, OpenScape Voice -- and the rest of the Unify UC portfolio -- is well-suited for large enterprises. Continue Reading 
- 
					Fortinet FortiGate UTM: Product overviewExpert Ed Tittel looks at Fortinet FortiGate UTM appliances, which combine different network infrastructure protection features into a single device. Continue Reading 
- 
					Cisco Meraki MX appliances: UTM product overviewExpert Ed Tittel examines Cisco's Meraki MX UTM Appliances, a series of UTM products that combines various network security and protection features into a single device. Continue Reading 
- 
					Check Point UTM Threat Prevention Appliances: Product reviewCheck Point UTM Threat Prevention Appliances are recognized by our reviewer as consistent software architectures that are easy to configure. Continue Reading 
- 
					Seven criteria for buying vulnerability management toolsExpert contributor Ed Tittel describes purchasing criteria for full-featured vulnerability management tools for small organizations to large enterprises. Continue Reading 
- 
					The business case for vulnerability management toolsExpert Ed Tittel describes business use cases for vulnerability management tools and examines how organizations of all sizes benefit from these products. Continue Reading 
- 
					Introduction to vulnerability management toolsExpert Ed Tittel explores how vulnerability management tools can help organizations of all sizes uncover defense weaknesses and close security gaps before they are exploited by attackers. Continue Reading 
- 
					Symantec Messaging Gateway and Symantec Email Security.cloud: Product overviewExpert Karen Scarfone examines the Symantec Messaging Gateway and Symantec Email Security.cloud email security gateway products that detects and blocks messages that contain suspicious content and threats. Continue Reading 
- 
					Proofpoint Enterprise Protection: Product overviewExpert Karen Scarfone examines the Proofpoint Enterprise Protection email security gateway product, which scans inbound and outbound email messages for malware, phishing and spam threats. Continue Reading 
- 
					McAfee Email Protection, Security for Email Servers: Product overviewExpert Karen Scarfone reviews the McAfee Email Protection and McAfee Security for Email Servers products that are used for monitoring, blocking and quarantining email messages. Continue Reading 
- 
					Clearswift SECURE Email Gateway: Product overviewExpert Karen Scarfone reviews the Clearswift SECURE Email Gateway product, which monitors incoming and outgoing emails. Continue Reading 
- 
					Fortinet FortiMail: Product overviewExpert Karen Scarfone reviews the Fortinet FortiMail email security gateway product that is used for monitoring email messages on behalf of an organization. Continue Reading 
- 
					Avaya UC product overview: Aura Communication ManagerThe Avaya Aura Platform, perhaps best suited for larger enterprises, supports messaging, voice, video, presence and mobility features, as well as virtualization. Continue Reading 
- 
					A look at SAP BusinessObjects BI suiteSAP BusinessObjects BI platform provides users with self-service access to information to support the decision-making process. Find out what's different in version 4.1. Continue Reading 
- 
					Cisco Email Security Appliance: Product overviewExpert Karen Scarfone reviews Cisco's Email Security Appliance product that is designed for detecting and blocking email-borne threats. Continue Reading 
- 
					Exploring Microsoft Power BI SaaS analytics productsMicrosoft Power BI SaaS analytics lets users view their most critical data via a live dashboard, create interactive reports and access their data on the go. Continue Reading 
- 
					What can PLM technology do for enterprises?Product lifecycle management can be an opaque topic. Here's help understanding exactly what PLM technology is and how it can help your company innovate. Continue Reading 
- 
					Oracle ZFS Storage Appliance system overviewOracle ZFS Storage uses mechanical and flash storage. The ZS3-2 and ZS4-4 models offer a variety of software for storage management, encryption and security. Continue Reading 
- 
					Hewlett Packard Enterprise's ArcSight ESM: SIEM product overviewExpert Karen Scarfone analyzes HPE's ArcSight Enterprise Security Management (ESM), a security information and event management (SIEM) tool used for collecting security log data. Continue Reading 
- 
					EMC RSA Security Analytics: SIEM product overviewExpert Karen Scarfone examines EMC RSA Security Analytics, a SIEM product for harvesting, analyzing and reporting on security log data across the enterprise. Continue Reading 
- 
					AlienVault OSSIM: SIEM Product overviewExpert Karen Scarfone checks out AlienVault's Open Source SIEM and Unified Security Management products for collecting event data from various security logs within an organization. Continue Reading 
- 
					Splunk Enterprise: SIEM product overviewExpert Karen Scarfone examines Splunk Enterprise, a security information and event management (SIEM) product for collecting and analyzing event data to identify malicious activity. Continue Reading 
- 
					SolarWinds Log and Event Manager: SIEM product overviewExpert Karen Scarfone examines SolarWinds Log and Event Manager, a security information and event management (SIEM) tool for collecting and analyzing event data to identify malicious activity. Continue Reading 
- 
					IBM Security QRadar: SIEM product overviewExpert Karen Scarfone takes a look at IBM Security QRadar, a security information and event management (SIEM) tool used for collecting and analyzing security log data. Continue Reading 
- 
					LogRhythm's Security Intelligence Platform: SIEM product overviewExpert Karen Scarfone examines LogRhythm's Security Intelligence Platform, a SIEM tool for analyzing collected data. Continue Reading 
- 
					Introduction to big data security analytics in the enterpriseExpert Dan Sullivan explains what big data security analytics is and how these tools are applied to security monitoring to enable broader and more in-depth event analysis for better enterprise protection. Continue Reading 
- 
					The benefits of deploying a data warehouse platformBig data may be all the rage, but data warehouse platforms are still being utilized by companies of all sizes. Expert Craig S. Mullins takes a look at the technology. Continue Reading 
- 
					Blue Coat ProxySG: Secure Web gateway overviewWith features like authentication and Web filtering, the Blue Coat ProxySG secure Web gateway can be deployed as a physical appliance, a virtual machine or a cloud-based service. Continue Reading 
- 
					Comparing the best intrusion prevention systemsExpert contributor Karen Scarfone examines the best intrusion prevention systems to help you determine which IPS products may be best for your organization. Continue Reading 
- 
					Palo Alto WildFire: Malware sandbox product overviewTightly integrated with existing Palo Alto next-generation firewalls, the Palo Alto WildFire cloud-based malware sandbox service supports both public and private cloud deployments. Continue Reading 
- 
					Hitachi NAS platform 4000 overviewThe Hitachi NAS platform 4000 series consists of four product models that use a discrete controller that can be attached to almost any Hitachi storage system. Continue Reading 
- 
					Comparing the top Web fraud detection systemsExpert Ed Tittel explores the features of the top Web fraud detection systems and compares critical purchasing criteria. Continue Reading 
- 
					What to expect from the Salesforce Sales Cloud platformSalesforce Sales Cloud is a CRM platform featuring a number of sales and CRM tools, which help businesses of all sizes manage their B2B and B2C engagement and sales strategies. Continue Reading 
- 
					Three criteria for selecting the right IPS productsExpert contributor Karen Scarfone examines important criteria for evaluating intrusion prevention system (IPS) products for use by an organization. Continue Reading 
- 
					Vormetric Transparent Encryption: Product overviewExpert Ed Tittel takes a look at Vormetric Transparent Encryption, a component of Vormetric's Data Security Platform that encrypts data and does access control for that data. Continue Reading 
- 
					HP Security Voltage's SecureData Enterprise: Product overviewExpert Ed Tittel examines SecureData Enterprise, which is a part of the HP Security Voltage platform, a scalable database security product that encrypts both structured and unstructured data, tokenizing data to prevent viewing and more. Continue Reading 
- 
					Protegrity Database Protector: Database security tool overviewExpert Ed Tittel examines Protegrity Database Protector, a database security add-on product that provides column- and field-level protection of confidential and sensitive data stored in nearly any type of relational database. Continue Reading 
- 
					Oracle Advanced Security: Database security tool overviewExpert Ed Tittel examines Oracle Advanced Security, a database security add-on product with transparent data encryption (TDE) and data redaction features. Continue Reading 
- 
					McAfee Database Activity Monitoring: Database security tool overviewExpert Ed Tittel takes a look at McAfee Database Activity Monitoring and McAfee Vulnerability Manager for Databases to see how they protect enterprises' databases and corporate data. Continue Reading 
- 
					Imperva SecureSphere: Database security tool overviewExpert Ed Tittel examines Imperva SecureSphere Database Activity Monitoring and Database Assessment, products that are deployed as an inline bridge or as a lightweight agent to assess and monitor local database access. Continue Reading 
- 
					IBM Guardium: Database security tool overviewExpert Ed Tittel examines IBM Guardium, a security product that offers continuous, real-time, policy-based monitoring of database activities. Continue Reading 
- 
					Enterprise benefits of network intrusion prevention systemsExpert Karen Scarfone explains how most organizations can benefit from intrusion prevention systems (IPSes), specifically dedicated hardware and software IPS technologies. Continue Reading 
- 
					Mitel VoIP 3300 series controllers: Product overviewThe Mitel VoIP platform consists of the 3300 series controllers. With support for up to 2,000 SIP trunks, the 3300 series can replace legacy telephony in small or large businesses. Continue Reading 
- 
					ShoreTel phone system: Product overviewThe ShoreTel VoIP system boasts several voice switches, simplified administration and automated backup. The premises platform is ShoreTel's replacement for PBX telephony. Continue Reading 
- 
					The basics of network intrusion prevention systemsExpert Karen Scarfone explores intrusion prevention systems and their acquisition, deployment and management within the enterprise. Continue Reading 
- 
					Cisco UCM voice over IP system: Product overviewDesigned for small and medium businesses, as well as large enterprises, Cisco UCM provides voice over IP technology that can replace a legacy telephone system. Continue Reading 
- 
					Kony Studio: A mobile app development platformKony Studio is a mobile app development platform that allows developers to build native or cross-platform apps using a single JavaScript codebase. Continue Reading 
- 
					Rally Software the go-to ALM tool for Agile developersRally Software gives Agile developers an ALM tool that, along with customizable dashboards, offers SAFe training and certification. Continue Reading 
- 
					Polarion Software offers compliance-focused ALMPolarion Software is a browser-based, ALM platform that offers high traceability functions for enterprises with a regulation focus. Continue Reading 
- 
					Breaking down the Altassian ALM software suiteWith JIRA, Confluence, HipChat, Bitbucket and Stash, the Atlassian ALM software suite is for enterprises of all sizes that use Agile methodologies. Continue Reading 
- 
					HP application lifecycle management: What you need to knowThe HP application lifecycle management suite, HP ALM, offers on-premises or SaaS ALM tools to enterprises small and large. Continue Reading 
- 
					The best SSL VPN products in the marketSSL VPNs are essential for securing network connections and communications. Here's a look at the best SSL VPN products in the industry. Continue Reading 
- 
					Comparing the best Web application firewalls in the industryExpert Brad Causey compares the best Web application firewalls on the market across three types of product types: cloud, integrated and appliance. Continue Reading 
- 
					Visual Studio IDE offers many advantages for developersMicrosoft's Visual Studio IDE allows development teams to create apps for multiple Windows 10 mobile and desktop platforms, as well as for iOS and Android. Continue Reading 
- 
					Learn more about the Android Studio IDE from GoogleAndroid Studio IDE from Google allows developers to build apps running on mobile, desktop and other emerging technologies running on Android. Continue Reading 
- 
					Comparing the leading VoIP vendors and their productsBefore purchasing a VoIP system, enterprises need to carry out careful research as VoIP vendors offer intricate products with varying capabilities. Continue Reading 
- 
					PeopleSoft ERP suite excels at human capital managementPeopleSoft ERP software aims to help enterprises recruit and retain top talent, while offering financial and supply chain modules. Continue Reading 
- 
					EMC XtremIO storage arrayThe XtremIO storage array from EMC is an all-flash system that offers scalability and high performance. Continue Reading 
- 
					Introduction to Web fraud detection systemsExpert Ed Tittel explores the purpose of Web fraud detection systems and services, which are designed to reduce the risks inherent in electronic payments and e-commerce. Continue Reading 
 
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                     
                    