Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
To take on the Internet of Things, CIOs will need an IT architecture with built-in digital intelligence to keep up with changing market forces and create competitive advantage. The Data Mill reports.
Crafting a specific, clearly defined cloud contract with your provider is crucial to staving off security problems and SLA breaches. In this tweet jam recap, participants shared tips on how to best communicate needs to cloud providers.
CIOs battle their own privacy demons as SpiderOak and other vendors attempt to protect customer data from NSA snooping. Also in Searchlight: Cisco cuts 6,000 jobs and the Internet could grow too large for its gear.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
In the wake of the Cerner-Siemens merger, Epic Systems' President Carl Dvorak refers to Epic as an EHR vendor underdog -- and talks about APIs and the cost of DirectTrust -- during a HIT Policy Committee health data interoperability hearing.
Technology based on the Internet of Things has worked its way onto consumer devices. When can we expect it to cross over to healthcare?
Stasia Kahn, a physician in the Chicago suburbs, spent 100 hours attesting to meaningful use stage 2 requirements. Many were easy. Some were hard. She feels it was worth the work she invested in it.
Combining the Internet of Things and cloud services could build an IT superpower. With its infinite capabilities and security enhancements, it'd be hard to find its kryptonite.
Google wants to merge the worlds of IaaS and PaaS to create a single continuum of services for customers. It's likely a sign of things to come from all the major public cloud vendors as they look to cover their bases in the maturing market.
Trouble could be looming for Microsoft after a silent patch locked Office 365 users out of their applications for days. What does the issue mean for customers operating Office 365?
Remote KVMs represent both convenience and potential for disaster. A few simple security steps can prevent downed servers, whether from an intentional attack or a simple miscommunicated update.
With sales sagging, legacy hardware suppliers are scurrying to form partnerships with a new generation of converged infrastructure vendors. But will these newly minted converged systems convince IT to open up the purse strings?
UPS sizing is hard, with confusing terminology and an ever-shifting IT load. If you get the calculations wrong, don't worry about a Michael Bay movie scene in the data center. Here's what to do when UPS is too wimpy or too beefy for the task.
A Carnegie Mellon University off-shoot applies maturity model techniques to big data. Cross-group communications are a key. The result is the Data Management Maturity Model.
Data industry veteran Anne Marie Smith discusses pressing issues, including the barriers to unstructured data governance. Part one in a series on data matters.
Hadoop vendors are pushing an approach that puts the distributed processing framework at the center of data management architectures. But some issues could sink the idea.
The Internet of Things is coming; is your security program in place? If not, it's time to start the planning process.
Social media compliance is not typically considered a big issue for companies, but expert Mike Chapple explains why it should be.
The Community Health data breach exposed the personal data of 4.5 million patients of the healthcare entity, opening up potential regulatory issues.