Editors' Picks
-
New role for NAC? Endpoint visibility enables contextual security
Network access control is dead. Long live endpoint visibility, access and security. New acronym, slightly different product.09 Aug 2013
-
Forrester: Reengineering a CRM strategy for the age of the customer
Forrester lays out five steps to a sound CRM strategy in the age of the customer.26 Jul 2013
-
Seven steps to building an effective incident response program
Often undervalued, a well-thought-out incident response program for security breaches gets its due in this tip by Forrester Research.02 Jul 2013
-
Cloud security risks still an issue for CIOs, but change is in the air
Cloud security risks have been a barrier to adoption for CIOs, but self-education along with enlightened vendor response is easing the move to cloud.20 Jun 2013
-
Forrester CXi shows CIOs key to improving customer experience
Companies that excel at customer experience work hand in glove with CIOs and IT, according to the Forrester 2013 Customer Experience Index.29 May 2013
-
As IT pervades the enterprise, here comes the chief procurement officer
The rise of the chief procurement officer raises questions about the role of IT.22 May 2013
-
As IT pervades the enterprise, here comes the chief procurement officer
The rise of the chief procurement officer raises questions about the role of IT.15 May 2013
-
As IT pervades the enterprise, here comes the chief procurement officer
The rise of the chief procurement officer raises questions about the role of IT.15 May 2013
-
Offboarding automation reduces risk, manual labor
With HR's focus on onboarding, the offboarding process often gets short shrift. But making do with checklists and spreadsheets can lead to problems.09 May 2013
-
Putting a price on information: The nascent field of infonomics
Companies are behaving as if information has a monetary value. The question is how much? The nascent field of infonomics aims to provide answers.08 May 2013
-
Putting a price on information: The nascent field of infonomics
Companies are behaving as if information has a monetary value. The question is how much? The nascent field of infonomics aims to provide answers.06 May 2013
-
Analyzing recent developments in the backup software market
Switching backup software products can be a hassle, so it helps to know your options. This article looks at changes in the backup software market.18 Apr 2013
-
The rise of SOA: Integration gateways converge
A SOA integration gateway can help ensure security policies are enforced.12 Apr 2013
-
How to secure applications with SOA application gateways
Secure applications are increasingly important as organizations open content to third parties.11 Apr 2013
-
Forrester VP says enterprise mobile applications miss the mark
Building an enterprise mobile application may not be the right focus for today's enterprise application development teams.05 Apr 2013
-
Navigating SOA appliances: How to choose the right one
With the help of an SOA appliance, organizations can more easily secure message exchanges across internal lines of business and with third parties.05 Apr 2013
-
How application integration maintenance is like taking care of a car
Forrester analyst Randy Heffner offers some best practices and his predictions for software integration management.03 Apr 2013
-
With social networking layer, Amazon flexes digital-disruption muscle
In this week's Searchlight: Amazon plays disruptor once again with its buy of social networking site Goodreads, cyberattacks get scarier and more.29 Mar 2013
-
More than half of Indian IT organizations to invest in mobile software in 2013
According to a recent Forrester report, mobile software is one of the most crucial technologies that Indian CIOs are adopting.27 Mar 2013
-
Protect intellectual property with data breach prep, cost analysis
Heidi Shey of Forrester Research says enterprises must protect intellectual property better or else face 'death by 1,000 cuts.'21 Mar 2013
Network Management Strategies for the CIO