IT Optimization America
 
              
About ITO America
IT Optimization Solution Centers
CIO Resource Centers
BSM & ITILv3
BI
Customer Centric Enterprise and Customer Experience Management
Data Center Optimization
Data Center Security and Integrity
Enterprise Mobility
Green IT and Energy Efficient Data Centers
SaaS and Cloud Computing
Service Oriented Architecture and BPM
Unified Business Communications
Virtualization and Data Center Automation
WAN Application Delivery
CIO Thought Leadership and Contributions
 Podcasts
Videos
Webinars
Business Technology Analyst Partners and Media Partners
ITO America Testimonials and Previous Clients
ITO America Media Kit
ITO America Information Technology Optimization News
Contact ITO America staff
ITO America IT Industry Events
Featured Information Technology Optimization Whitepapers and Articles
CIO Thought Leaders on Panels and Discussions
Stuart Fulton
Stuart Fulton

U.S. Chief Information Officer, PwC
Dr. Stephen Herrod
Dr. Stephen Herrod

SVP of R&D and CTO, VMware
Beth S. Perlman
Beth S. Perlman

CIO & SVP, Constellation Energy
Barbara J. Desoer
Barbara J. Desoer

Bank of America
 
subscribe now
  Subscribe to ITO America Online

WEB
  Subscribe to ITO America News Feeds

RSS
 
ITO America Business Technology Publication
Riverbed The CIO's New Guide to Design of Global IT Infrastructure
Is it possible to eliminate the impact of distance? This paper explores the 5 key principles successful CIOs are using to redesign IT infrastructure of any size. Learn how to be prepared to adapt your environment in a way that supports distributed employees, anytime anywhere collaboration and the need for business continuity during a disaster.
Podcast 70w Dk Grey The Importance of an Application Retirement Methodology with Defensible Disposition
Manu Chadha, Director, Strategic Solutions at HP IM looks at how a solid application retirement methodology can transform IT operations, the relationship between information and application sprawl, and how organizations can better manage information within the enterprise. Duration: 9 minutes.

Podcast 70w Dk Grey The Enterprise Digital Information Explosion - How to Avoid Infinite Retention
In this interview, Manu Chadha, Director, Strategic Solutions at HP Information Management, discusses the digital information explosion, infinite information retention, and how technology leaders can effectively manage and dispose of electronic documents at their organization. Duration: 9 minutes.

Podcast 70w Dk Grey Break the Cycle of Infinite Information Retention
Infinite information retention is costly and a security risk for organizations, yet 95% of businesses hold on to unneeded data. Lou Harvey, HP IM Software Archive Solutions Enablement Director looks at the disadvantages of infinite information retention and the penalties organizations may face if they do not meet IM regulations. Duration: 17 minutes.

Podcast 70w Dk Grey New PCI DSS 2.0 - Focus On Virtualization
The supplement will include detailed recommendations - perhaps requirements - and auditable controls for virtualized systems that are sure to impact your IT security and compliance plans for 2011 and beyond. But for now, this guidance is under review and subject to change. What should you do in the meantime?

EMA Simplifying Virtualization: Management Through Automation
Virtualization - a technology that abstracts physical hardware from IT services - is a disruptive innovation that is taking IT by storm. A well-managed virtualization deployment improves server utilization, reduces hardware costs, increases uptime, makes IT faster to react, and drives significant ROI. It can also provide advantages in terms of service performance, application resiliency and responsiveness in delivering critical new IT services.
EMA Managing Risk on the Journey to Virtualization and the Cloud
Virtualization has set IT free from many of its legacy constraints on resource optimization. But as virtualization enables IT to evolve into highly flexible service architectures such as cloud computing, these new approaches to technology also introduce new risks. How can enterprises best manage the wide range of risk and compliance challenges that accompany the many opportunities introduced by these innovations?
Filmstrip 70w Dk Grey Building Case - Based Solutions: Better Decision Making in a Diverse and Competitive Financial Services Marketplace
Trying to juggle the needs and demands of internal clients and stakeholders is an ongoing challenge for most CIOs. Balancing new application development projects with ongoing maintenance activities can require not only skill and agility, but time and resources that many organizations cannot afford. This session provides an overview of how to leverage a comprehensive and flexible case management solution.
Where Ignorance Is Not Bliss: Understanding How Virtualization and Cloud Computing Changes Security Management Where Ignorance Is Not Bliss: Understanding How Virtualization and Cloud Computing Changes Security Management
This webcast explores the changes in security management wrought by the transformative technology of virtualization - changes that enterprises cannot afford to ignore - and the emergence of new techniques and tools that give enterprises the visibility and control over the virtual environment this new paradigm requires.
Where Ignorance Is Not Bliss: Understanding How Virtualization and Cloud Computing Changes Security Management Where Ignorance Is Not Bliss: Understanding How Virtualization and Cloud Computing Changes Security Management
This webcast explores the changes in security management wrought by the transformative technology of virtualization - changes that enterprises cannot afford to ignore - and the emergence of new techniques and tools that give enterprises the visibility and control over the virtual environment this new paradigm requires.
Upcoming Webinar

Thursday, August 26, 2010 2:00 PM - 2:45 PM EDT

Where Ignorance Is Not Bliss: Understanding How Virtualization and Cloud Computing Changes Security Management Where Ignorance Is Not Bliss: Understanding How Virtualization and Cloud Computing Changes Security Management
With the rise of virtualization - and new approaches to IT such as cloud computing that virtualization directly enables - long-established security concepts based on physical isolation and control now need reconsideration. This webcast explores the changes in security management wrought by the transformative technology of virtualization - changes that enterprises cannot afford to ignore - and the emergence of new techniques and tools that give enterprises the visibility and control over the virtual environment this new paradigm requires.

Register to Attend
Shield Vulnerabilities with Virtual Patching from Trend Micro Shield Vulnerabilities with Virtual Patching from Trend Micro
Got older systems? Shield vulnerabilities before they can be exploited! No time or budget to upgrade Windows 2000, hard-to-patch databases, or other unsupported systems? Without bug fixes, patch releases, or workarounds, these systems are vulnerable to new malware and other cybercriminal exploits. See what Trend Micro virtual patching can do for you.
Filmstrip 70w Dk Grey Trend Micro - All Clouds Are Not The Same
Thirty-year security veteran and innovator, Raimund Genes, CTO, Anti-Malware,Trend Micro, offers an executive insight into cloud security and Trend Micro's Smart Protection Network.
Quest Making the Case for Application Performance Monitoring
Monitoring the performance of your business-critical applications can be a significant undertaking in today's complex IT environment. This challenge is amplified as virtualization, cloud computing and composite applications continue to drive dynamic change in the data center.
Riverbed Increase IT Performance from the Enterprise to the Cloud with WAN Optimization - Taneja Group
WAN optimization plays an important role in today's highly distributed datacenters and cloud computing architectures. Massive consolidation and data mobility, enabled by virtualization, have radically altered how we build servers, design applications, and deploy storage for the emerging 'cloud' decade. This paper discusses how Riverbed solutions effectively eliminate IT performance constraints in such environments.
Rethink Your Web Gateway Security - Why You Need More than URL Filtering Rethink Your Web Gateway Security - Why You Need More than URL Filtering
Cybercriminals are more organized to the point that web-borne malware has become an integral part of the Internet. This webinar explores the changing threat landscape, the movement toward cloud-based technologies in response to changing security requirements, and why real-time threat intelligence and consolidation of security services at the Internet gateway brings greater protection for less cost.
Practical VM Security Techniques for Internal and External Virtualized Infrastructures Practical VM Security Techniques for Internal and External Virtualized Infrastructures
This webcast discusses current trends in virtual infrastructure security while offering practical techniques for securely managing today's virtual infrastructures. Learn new approaches for virtualization security, security features that should be included in all production-use hypervisors, as well as key questions that IT decision makers should be asking to prospective hypervisor and security vendors.
Forrester White Forrester - Total Economic Impact Of Trend Micro Enterprise Security
This study illustrates the financial impact of an organization migrating to Trend Micro Enterprise Security and the benefits received from deploying a cloud-client solution for Web, messaging, and endpoint security.
Nemertes-white Nemertes Research - Securing the Physical, Virtual, Cloud Continuum
The data center is undergoing a radical shift, from virtualization towards internal cloud environments where workloads dynamically move, start and stop driven by real-time performance needs. At the same time, IT practitioners are interested in exploring external cloud computing options - but security and compliance concerns are squelching adoption.
Esg 70px ESG Whitepaper - The Cloud-Based Threat Defense Model
While the economic forecast remains uncertain in 2010, ESG's research indicates an increase in IT spending with a focus on security and risk management initiatives. Why are CIOs still so concerned about security? Which security technologies will they purchase?
Podcast 70w Dk Grey Security in a New Era of Threats
In this podcast, Jon Ramsey, CTO at SecureWorks, addresses an array of security issues currently facing businesses, including security in the cloud, insider attacks, securing mobile devices and how to manage spam and malware. The story of a CEO whose gmail account was hacked eventually leading to the loss of $1 million will shock you.

Evolving Mobility Needs and Requirements for the Enterprise Evolving Mobility Needs and Requirements for the Enterprise
Even in a time with great economic and financial uncertainty, the IT and business landscape continues to change at a frenetic pace. One of the greatest areas of change pertains to the adoption of smartphones and other mobile solutions in the enterprise. This adoption has also changed in the last couple of years from an almost exclusively centrally procured process to one where individuals can go to their local store and purchase their smartphone of choice.
Media Partners and Analyst Partners
Media Content Partners and Analyst Content Partners