HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Grc News & Analysis

Office 365 Promises Greater Data Security, Theft Protection

2014-23-October-theft-of-finances.jpg

Despite the progress Microsoft is making with Office 365, its claim to universality won't stand up until it gains traction with government and public bodies. Microsoft obviously understands this.

While Microsoft the company has given Office 365 for private enterprises a lot of love in the past few months, it hasn’t been neglecting the public sector either. And that makes the thorny issue of regulatory compliance even more critical.

Regulatory compliance is important for the private sector, but it is essential for public agencies. As a result, Microsoft is introducing IRS 1075 compliance to Office 365. The goal here is to prevent anyone from walking away with personal financial information, especially tax related data.

Security Today: Dynamic Access, Permissions, Encryption

2014-22-October-Security.jpgContent security is top of mind these days. Every week brings news of yet another data breach, with companies large and small making the news for all the wrong reasons.

Many of these breaches occurred because of a failure to maintain base level security or enterprise data. Although structured databases are a treasure trove of sensitive information, most database systems offer many layers of protection with the advantage that the database itself remains, usually on IT-managed infrastructure.

Security controls are potentially more critical for unstructured content -- because file-based information is insanely portable and moveable with modern devices and always-on connections. It’s important to consider content security in light of the more recent history of enterprise security. For a long time, security has been defined by borders and boxes.

Why Risk Management Technology Projects Fail

Too many organizations buy risk management solutions for today, without thinking of their needs for the future.

Michael Rasmussen works with a number of companies that sell solutions for risk management (these days typically packaged with other “stuff” and mislabeled GRC solutions) and helps buyers of those solutions, as well as participating in related conferences and seminars.

And though he has never run a risk management function, his views merit attention.

Quantifying the Value of Your Data

Whether it’s the amount of risk in a particular decision or the reason for a problem that impacts the bottom line, the unknown is a scary concept. As businesses continue to generate vast amounts of data, the business value of this information is palpable. However, determining whether or not this data has any economic value is difficult. Armed with advanced tools that produce incredibly huge amounts of data, storage, retrieval and analysis, businesses have taken on a new method to minimize this unknown.

The Key to Security is Subtlety

2014-23-September-Megaphone.jpgPeople are similar when you dig deep: they want to get thing done and move on to the next thing. Even procrastinators get great work done when faced with having to get an even larger task accomplished.

Most people also share a degree of stubbornness. People are happy to do things your way if they see the benefit, but anything that's perceived as getting in the way is quickly worked around. When you try and force something, they will dig in their feet on sheer principle. It's amazing how hard people will work around things that they view as unnecessary change.

For organizations rolling out new systems, this is a problem.

Hoarders Anonymous for Unstructured Data

2014-19-September-Pez-Collection.jpgDo you have a storage area where you keep items you rarely or never use? Do you periodically sort out your stuff, or do you keep collecting items of debatable value? It’s human nature to hold onto things we never use for extended periods of time -- it's like the junk drawer everybody has somewhere in their house that holds a collection of random items we think are important, but we usually use the same few items every time we open the drawer.

It’s called a “JUNK drawer” for a reason -- because it’s mostly junk, and most of it should be tossed in the trash. So why do we keep these items of questionable value or use?

My Tolerance for Risk Appetite Is Fading

Making people believe they have effective risk management because they discuss a point-in-time list of so-called “top risks” and set limits for those few risks is making them believe in fairies.

It is setting them up to be surprised and for a failure to deliver success.

What Continuous Compliance Success Looks Like

2014-17-July-King-World.jpgThere is no specific, prescriptive path to guarantee your business will be covered for every eventuality and incident it may encounter. But by following three steps, you can get you -- and your organization -- in a proactive compliance and security mindset.

The Link Between E-Discovery and Information Governance

The difference between e-discovery and information governance is the difference between reactive and proactive.

When documents shifted to digital format, companies needed a solution to help find and identify the electronically stored information necessary for legal procedures. Enter e-discovery.

E-discovery allows companies to identify information assets, which enables them to establish governance policies. These policies include proper retention controls, storage hierarchy migration criteria, metadata capture, security, privacy and access rights and more. The discovery and inventory of information assets is a necessary part of an overall information governance strategy.

Microsoft Tightens Email Security

2014-01-July-Security.jpg

Edward Snowden has done more for electronic security than anyone else. Singlehandedly, he has forced some of the biggest IT vendors to take a close look at data, data transfer, and how it is stored.

This follows the revelation that security agencies across the world were systematically scanning emails.

In response, Google has made much of its email encryption practices and its efforts to secure the contents of the email itself.

Last night, Microsoft, in turn announced that it has upgraded its encryption standards across all its networks.

These Trends are Driving Structured Data Archiving

The growing use of Apache Hadoop, increasing data warehouse volume sizes and the accumulation of legacy systems in organizations are all factors fostering structured data growth. To manage it, organizations are being forced to look at data archiving and how to get non essential data out of mainstream enterprise applications.

The findings appear in Gartner’s first Magic Quadrant for Structured Data Archiving. This is the first time that Gartner has produced such a Magic Quadrant, which features 13 vendors in total including the four leaders.

While many enterprises are yet to embrace data migration and archiving, Gartner estimates that migration will represent about 20 percent of all information governance projects. To help enterprises do this, four vendors have emerged as the leaders in the archiving space: HP, IBM, Informatics, and Solix.

In this article, we will explore this quadrant and take a look at emerging trends and the market in general. In a second article, we'll take a deeper look at the leaders and what they are offering. 

 

Communication Is Key to Continuous Compliance

Compliance is no longer a monthly, or even weekly, task -- it’s something that needs constant evaluation and adjustment. Sources change and applicability of control over data should be under consistent review -- that’s the age of continuous compliance we live in today. One requirement of continuous compliance is ongoing, effective and intelligent communication. There are some ways to help improve communication and ensure your compliance and security teams get the best, most relevant and timely information to keep you secure and compliant -- and remain that way.

Why Selectica Bolstered Contract Management With Iasta

2014-9-June-blaine_mathieu.jpg

Selectica CEO Blaine Mathieu told us in April the latest version of his company's contract management solution is like CMS “on steroids.”

With the provider’s acquisition of Iasta this month, Selectica could be banned from Major League Baseball for steroid use.

Iasta, a Gartner leader in its 2013 Magic Quadrant for Strategic Sourcing Application Suites, brings to Selectica its suite for upstream procurement solutions. Selectica’s wants Iasta to complement its own contract management solution.

“We started as a strategic partnership, but it became apparent that we could be much more powerful together than apart,” CEO Mathieu said. 

Do You Know When Your System Is Breached?

Information security professionals are always chasing to catch up with the bad guys.

Traditional information security (or cybersecurity) is focused on preventing unauthorized access to your network, systems, applications, infrastructure and data.

But, as we all know only too well, the people trying to get in are exposing and exploiting vulnerabilities faster than we can plug the holes. 

Surveys of security professionals around the globe report that more than 80 percent of companies know they have been hacked. The roughly 15 percent who did not report being hacked probably don’t know -- they just haven’t detected it yet.

Is NSA Leaker Edward Snowden the Info Governance Champ?

AIIM information governance in the enterprise 320 x 240.jpg Whatever you think of US National Security Agency leakerEdward Snowden, you have to concede he has done a lot for information governance (IG). He didn't build the ultimate IG technology.

But his behavior over the past 12 months have forced a large number of organizations to sit down and ask themselves, "What if?"

What if your information is not governed properly?

New research from AIIM shows only 10 percent of organizations have an effective IG policy in place, while 21 percent have polices that are mostly ignored. Most of the rest consider IG a work in progress.

Displaying 1-15 of 330 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next >