Many organisations need help expanding their data security policies to embrace virtual IT environments
Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.
RIM’s little smartphones are some of the most popular devices on the market – but BES is complex and costly. How can you get customers online without the cost of a full BlackBerry server?
USB has given us fast, easy access to devices and files – but it’s also a security nightmare. How can you lock it down for clients?
Setting up SANmelody to create your own storage fabric
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010