Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
Today's enterprise data architecture strategy has to address how to align existing data systems with growing information needs, capabilities and data sources.
IT pros who are lazy, impatient and hubristic are just what CIOs need. Gartner analyst Danny Brian explains why in this SearchCIO tip.
Wall Street's roller-coaster week has left many unnerved. Does this stock market volatility spell trouble for IT budgets and tech companies? Also in Searchlight: Google fights claims of market abuse; Windows 10 hits 75 million devices in one month.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
The IT security team at Virtua, southern New Jersey's largest healthcare provider, works with consulting firm CynergisTek to lock down PHI.
In this HIT Squad podcast, SearchHealthIT reporters discussed the benefits and problems of ICD-10 coding as seen by experts.
When his wife was diagnosed with stage 3 breast cancer, CIO John Halamka turned to big data analytics in healthcare.
IT pros buying into the hybrid cloud model need tools to manage on-site and public-cloud resources. Surprise, surprise -- VMware has just the thing.
Supporting big data and high-performance computing in the cloud introduces a number of challenges. Fortunately, larger VM instances and GPUs offer relief.
In the era of hybrid IT, migrating apps to the public cloud is only the first step of a sound cloud computing strategy.
By moving to the cloud, a business can offload some responsibility for lost or stolen data, but external penetration testing in the data center remains critical.
I have two years of experience in mainframe technology, currently working as a mainframe developer. I want to change to Java technology.
With the split two months away, HP Enterprise needs to ensure its hardware, software and services groups work and play better together.
IBM has added massively parallel processing and R language support to its dashDB software -- important steps for a data warehouse database tailored for distributed cloud computing.
The Hadoop data lake concept presents plenty of challenges for organizations. But the experiences of early adopters point the way toward successful data lake architecture deployments.
Data preparation processes are changing as business users cope with big data in all its variations, according to the latest Talking Data podcast.
Geofencing technology creates a virtual fence on employee devices, adding a crucial extra layer of security. But do privacy concerns negate the benefits of this feature? Expert Michael Cobb explains.
Third-party DNS providers claim to improve browsing times and speeds, but are they a secure enterprise option? Expert Michael Cobb explains.
Security gamification puts formal verification back in play.