Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
Chief data officers make the case why organizations need them; watch out CIOs: The Data Mill reports from the MIT Chief Data Officer and Information Quality Symposium.
How does Etsy keep its platform business model in tune? Deploying up to 60 code changes a day is par for the course.
Airbnb does it; Uber does it. What about your organization? Sangeet Paul Choudary lays out the fundamentals of the platform business model.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
According to Telehealth and mHealth experts, providers can achieve ROI in the wearable health technology market. This news analysis examines the issue.
Data breaches in healthcare won't be stopping anytime soon. At the mHealth + Telehealth World Congress, experts said learning from past thefts is key.
Healthcare data many think is protected by HIPAA may not be. With wearable health technology, some experts are concerned by what's not covered.
The cloud computing market is brimming with opportunity for IT pros -- and especially those with open source and PaaS expertise.
OpenStack and VMware are both viable options for hybrid and private cloud. So which one should your organization choose?
Dell Cloud Manager added Azure Pack Support, custom catalogs and auto-scaling features as the company tries to meet the demands of hybrid IT environments.
There are ways to combine DCIM and ITSM systems in the data center that give even better visibility.
Data center managers take on the burden of protecting the business's data assets. Discover the best strategies to deploy firewalls, encryption and other tactics.
The Uptime Institute's tier-level certification will now only be handed out to constructed projects that meet the standards, not for designs.
Quest 2.0 is an upgraded query engine and data integration platform from Metanautix. Its designers helped create Google Dremel, a herald of sorts for several new big data query tools.
This editor has waxed poetic on the idea of the 'DevOps Genius' enough. However, a look at the history of SQL-on-Hadoop in big data analytics gives the lie to that notion.
The Neo4j graph DBMS delivers high performance and availability, with its native graph capabilities for data storage and access.
The Border Router Security Tool aims to improve router security to boost Internet safety. Expert Kevin Beaver explains its place in the enterprise.
False positive security alerts are troublesome, costly and time-consuming. Expert Kevin Beaver explains how to reduce the number of false positives
Expert Karen Scarfone examines security information and event management systems and explains why they are crucial for enterprise security.