Network and boundary security are more important than ever for organizations of all sizes. A variety of security specialist firms now offer leading-edge virtual and physical devices for Unified Threat Management (UTM) to raise the security bar ever higher and respond proactively to zero-day threats.
Stories by Earl Follis and Ed Tittel
Most companies understand the risks associated with disaster recovery and business continuity and plan accordingly. Few can say the same thing about the software they own -- or don't own, as the case may be. That's where software asset management and software license management tools can make a difference.