Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
As the number of IoT devices in the enterprise grows, so do the potential risks. In this #CIOChat, participants identify the biggest IoT security challenges facing IT and the enterprise.
Should your legacy IT systems stay or go? CIOs tasked with this decision might find eliminating past-their-prime systems to be the kindest cut of all.
Tom Davenport lays out five strategies for surviving automation; big data evolves; and the high-end food industry feasts on big data: The Data Mill reports.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
From improving customer experience to connecting medical devices to physicians' smartphones, the Internet of Things is steadily colonizing healthcare.
Two independent physicians in North Carolina experienced IT failures so severe that they reconsidered their solo status.
A funding opportunity from the ONC and HHS will give out $28 million in awards, spread out among as many as 12 state HIEs.
Amazon Web Services is the clear cloud market leader, but Microsoft Azure and Google have their advantages. Which cloud provider is right for you?
With high hopes for reducing TCO, many enterprises migrate apps to the cloud. But, depending on the app, those cost reductions aren't always in the cards.
Despite its massive potential, the Internet of Things is ushering in new and unique security challenges. But who's responsible for tackling them?
The TechTarget Server Hardware Survey reveals how data center pros buy blade servers, and what they plan to purchase in the next year.
What is the best way to access large multicore servers for benchmarking? How do I know what needs to be benchmarked?
The specs of the 480-V power equipment are all the same as a 400-V step-up transformer. The only difference is voltage. Can we use the 480-V transformer with 400-V servers?
Hadoop vendor MapR's latest release puts the focus on database replication across data centers. Also, Microsoft has built a Python-friendly Azure service for machine learning in the cloud.
The Open Data Platform has arrived, but not all Hadoop vendors are on board. The initiative, aimed at boosting interoperability, formed a backdrop for discussion at the Strata + Hadoop World 2015 conference.
Database expert Craig S. Mullins examines the criteria and characteristics you should consider when determining if a relational database management system is right for your company.
Demetrios Lazarikos describes the security big data system he implemented at retail giant Sears, as well as how it helped thwart retail fraud activity and how he convinced executives to support the implementation.
CERT's ITPM certification is designed to help enterprises with their insider threat programs. Expert Joseph Granneman discusses the certification and its relevance.
NoSQL database security has taken a backseat to performance in Hadoop-based security big data analytics systems, but that may soon change thanks to growing demand and maturing NoSQL security products.