Magic quadrant for operational database management systems
As the operational DBMS market enjoys a dynamic resurgence, new entrants are challenging established leaders.
Internal segmentation firewall
While an edge firewall can do an excellent job of protecting the network perimeter, it can’t help with attacks on the inside, after a breach occurs.
Virtual application patterns
In current enterprise environments, many corporate IT projects are delivered behind schedule.
Four top cyber crime trends
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.