Application Optimization Application Placement Application Rationalization Big Data Data Center Data Center Migration Data Center Strategy Hybrid Data Center Data Center Facilities Financial Leasing Infrastructure Optimization Network Optimization Server Optimization Storage Optimization IT Management C-Suite Collaboration IT Workforce IT Security Big Data Security Cloud Security Data Security Mobile Security Virtual Security Workspace Security IT Strategy Managed Services Most Popular Articles Recoverability Business Continuity & Disaster Recovery Data Protection & Recovery Management Service Management Sourcing Maintenance Transformational Technologies Cloud Convergence Mobility Virtualization Workspace
Application Optimization Application Placement Application Rationalization Big Data Data Center Data Center Migration
Videos White Papers Brainsharks Webinars Slideshows Infographics
Stay Connected get our newsletter Subscribe Now
IT FOCUS AREA: Most Popular Articles
more in Most Popular Articles

The 5 Most Popular Articles in March 2012

AUTHOR: Matthew Royse
March Calendar 2012

Our readers in March were interested in the topics of mobile security, data security, big data and business continuity and disaster recovery.

Find out below what specific articles our readers liked the most last month.

 

1. Mobile Devices in the Workplace: 5 Key Security Risks

Mobile devices are rapidly reaching all corners of the enterprise. In order to secure corporate data on these devices, it is important to first understand the risks.

 

2. Critical Elements of a Successful Mobile Security Plan

In order to safeguard enterprise data, companies should develop a holistic approach to mobile security. Learn what aspects are needed for a successful mobile security plan.

 

3. Big Data in the Cloud

Big data—as a potential business game changer—is attracting a lot of attention. Find how your organization can take advantage of big data.

 

4. 10 Reasons Why Your Organization Needs Data Loss Prevention

Data volume has been growing exponentially, increasing chances for theft and accidental disclosure of information. Learn how data loss prevention can safeguard your data.

 

5. 4 Things Organizations with Effective BC/DR Programs Do Well

After working with hundreds of clients, author Peter Laz reveals the four elements that companies with effective BC/DR programs know and implement consistently. 

 

If you want to find out earlier what articles are the most read, subscribe to the Monthly FOCUS Digest newsletter. This email highlights the most popular articles, most popular multimedia content and one pick from the Editor from the previous month.

Leave A Comment




Comments

Submit Comments

Policy for Comments

Please make sure your comments follow these guidelines:

- Use your real name, not keywords
- No signature links in your comments
- No foul language (please)

Readers are solely responsible for the content of the comments they post here. Comments are subject to the site’s terms and conditions of use and do not reflect the opinion or approval of Forsythe Technology. Readers whose comments violate the terms of use may have their comments removed.

You might also like

Most Popular Articles
Most Popular Articles

The 5 Most Popular Articles in April 2012

Find out what stories our readers liked the most in April.
Most Popular Articles
Most Popular Articles

The 5 Most Popular Articles in May 2012

Our readers like these stories the most in May.
Most Popular Articles
Most Popular Articles

The 5 Most Popular Stories in February 2012

Learn what articles were the most popular in February 2012.
Subscribe To Our Newsletter