Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
If customer service is a competitive differentiator, too much standardization can hurt IT departments and companies alike.
Mobile apps are constantly connected, which makes mobile backend as a service ideal for running business logic and data analysis. Here's what you need to know about cloud back-end services.
MIT Sloan cybersecurity expert Stuart Madnick talks about clear and present dangers in an IoT-enabled world.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
When it comes to interoperability standards in healthcare, there are many barriers. One of Epic System Corp.'s vice presidents weighs in.
While many use wearable health devices on their wrists, digital health researcher Sandra Rosenbluth puts a step tracker on her ankle and sees the wearable as part of her work.
Implementing and integrating an EHR in a healthcare organization is one important step in transforming healthcare, but it is not, and should not, be the sole focus.
New Google security certifications are welcome, if belated, additions to the cloud platform, providing assurances to enterprise customers about protecting their data.
Before working with multiple cloud providers, evaluate their services for compute, storage, security and more.
Cloud admins use Azure Resource Manager to track apps and resources in Microsoft's public cloud. What are some tips for getting started with the tool?
In capacity and cost comparisons of HDD and SSD storage, solid-state is favorable. Find out what the transition will mean for data centers as the future of HDD looks grim.
Researching DCIM can trigger a lot of questions. Here's how to evaluate DCIM tools to avoid post-purchase remorse.
A typical OpenStack deployment is still for 'net new' workloads outside of the world's largest enterprises, but some big names have started to show off their use of OpenStack.
By examining the key characteristics presented here -- along with the top Hadoop distributions -- you can determine which subscription is right for your organization.
Surging big data is changing data modeling techniques, including schema creation. The word from Enterprise Data World 2016: Data pros must adjust.
Open source data engineering has become a way of life at e-commerce leader eBay, says the company's Debashis Saha. Kylin is one of the tools that has resulted.
The amount of enterprise unstructured content is growing every year. Expert Sean Martin explains why IAM is an important component of unstructured data management and security.
Craig Wright's second attempt to prove he's the Bitcoin creator, Satoshi Nakamoto, was debunked after fooling the mainstream press, but his motives are still a mystery.
Web application security vulnerabilities exist from browser to SSL/TLS. Expert Brad Causey explains how application security testing and Web application firewalls can address this.