The Target security breach and discovery of the "Heartbleed" vulnerability in web encryption software taught us some important lessons about enterprise security.
more
The total cost of ownership (TCO) debate between a premises and cloud decision continues to wage on. Depending on how you look at it, it seems that you arrive at a different conclusion.
more
While log analytics is a well-known approach within systems and security management, its use in support of network operations is relatively new. Many times, the key to solving a difficult, subtle performance issue or behavioral anomaly can only be found in network logs. Further, network logs are proving useful for integrated/sustained monitoring of overall IT health and activity across infrastructure, applications, and services.
Join EMA VP of Research, Jim Frey, for this informative webinar to get the latest research results.