Framework software, Data retention tools, ID and access management, DR, Reporting software, Encryption solutions, Log management software, Compliance services, Policy management software, Document management software, Content management software, Financial and accounting software
Compliance teams, Reporting, Automating compliance, Governance and compliance, Training, Audits, Risk management, BC, Information technology governance, Enterprise cloud compliance, Business records management
( Feb 13, 2015 )
( Feb 05, 2015 )
It can be tempting to stray from the security roadmap security professionals have put in place when data breaches like the Sony and Anthem breaches are all over the news. But experts say it's crucial to stick to the security basics.
With Android for Work, Google gets into the BYOD business. Also in Searchlight: FCC votes yes on Net neutrality; sex bias lawsuit on VC firm Kleiner Perkins shakes up Silicon Valley.
A shared technology services marketplace, like the one recently implemented by Oakland County, Mich., offers a variety of benefits to governments constrained by tight budgets, including more affordable prices for services and interesting opportunities to analyze data.
Server virtualization, managed data centers and hosted software can affect your company's compliance controls. Here's how to overcome the obstacles.
An educational testing service firm gives high marks to an off-the-shelf security management tool to protect student data.
The underlying legal issues for SaaS contracts can be ticking time bombs if you don't pay attention to the details.
A funding opportunity from the ONC and HHS will give out $28 million in awards, spread out among as many as 12 state HIEs.
The ONC published a draft of its interoperability plan that delineates stages and targets for healthcare professionals to hit over the next decade.
Universal applications, built to work on different mobile devices, could have a future in healthcare. Find out when and where they might pop up.
Cloud brokers connect a growing landscape of service providers with busy business users. But what impact would they have on my IT team?
While AWS Config looks like another home run for the cloud giant, that doesn't mean everything is perfect. So where does AWS need to improve?
Cloud orchestration is gaining traction -- but how does it differ from provisioning? Expert Tom Nolle suggests thinking of one process as walking and the other as dancing.
Performance monitoring tools preemptively thwart run-the-business application problems, but only when you have the right APM tool for the job.
Disaster recovery planning and infrastructure builds vex IT managers. Cloud services offer lower costs and more flexibility, but not without risk.
Most of the IT budget goes to maintaining the data center hardware and software. Consider outsourcing for better support.
The Open Data Platform has arrived, but not all Hadoop vendors are on board. The initiative, aimed at boosting interoperability, formed a backdrop for discussion at the Strata + Hadoop World 2015 conference.
Database expert Craig S. Mullins examines the criteria and characteristics you should consider when determining if a relational database management system is right for your company.
Building and running enterprise Hadoop applications takes more than data crunching. First, Hadoop data must be absorbed into company processes, a Western Union IT manager says.
Legal teams play a key supporting role in successful information security programs. Expert Mike Chapple reviews three areas where infosec pros and lawyers should work together, and offers tips to foster effective collaboration.
Macro viruses are back in the form of macro malware, creating a potentially major issue for enterprises. Expert Nick Lewis explains how to ensure your organization doesn't fall victim.
News roundup: Data breaches aren't associated with soaring stock prices, but recent examples show breaches may boost stocks. Plus: Gemalto confirms possibility of GHCQ/NSA hack; Target breach costs company $162 million; Superfish swims on.