Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
What separates the high earners from the low earners among senior IT executives? The ability to negotiate a bonus helps, according to the 2014 TechTarget IT Salary and Careers Survey.
IT executives said 2015 will be the year of security, cloud computing and business intelligence/big data projects, according to TechTarget's IT Salary and Careers Survey. A lesser priority? Mobile technology.
Is your enterprise mobile app development strategy download-worthy? Discuss mobile app dev in our SearchCIO tweet chat Wednesday, Oct. 29, at 3 p.m. EDT.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
A years-long study on clinical decision support found it can offer value during care, but bring harm when used improperly.
Connected Health Symposium 2014 puts a spotlight on mHealth technology, how it can drive new healthcare reimbursement models and patient engagement.
Today's powerful business intelligence platforms can turn healthcare data into applicable analysis without intervention from data scientists.
EMC acquired Cloudscaling with the hope of sharpening its OpenStack expertise. However, the impact on OpenStack adoption has yet to be determined.
A Xen hypervisor issue forced Amazon Web Services to reboot EC2, causing issues for customers. Are disruptions just part of the cloud package?
IBM joins forces with Microsoft to support the other’s cloud platforms with their respective enterprise apps. Whether the software gains can cover IBM’s hardware losses remains to be seen.
With the LIO iSCSI target service, Linux shops have an affordable SAN option that ranks up there with expensive proprietary storage solutions.
COBOL might be one of the oldest programming languages, but that doesn't mean developers know all there is to know. We have expert insights on COBOL basics.
You can't depend on a building system to run the data center. Implement a BMS and a DCIM tool to monitor and predict system changes, tighten security and more.
TechTarget editor Joe Hebert investigates the recent Oracle OpenWorld and JavaOne conferences in this episode of BizApps Today.
When Lehman Brothers failed in 2008, regulators and other banks had precious little data to gauge wider financial risks. Enter legal entity identifiers, a form of semantic data.
Brian McKenna joins the Talking Data podcast crew to look at differences in managing and analyzing big data as handled by IT shops in the U.K. and continental Europe.
Malware using seemingly real digital certificates is becoming more prevalent. Expert Nick Lewis discusses how to detect fraudulent certificates.
When evaluating the business cases for MFA in the enterprise, expert David Strom says an organization must first identify which of the three operational scenarios apply to a potential implementation.
Expert Ernie Hayden takes an in-depth look at the development of NIST SP800-82 since its birth, and what the standard includes in the most recent revision.