HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Grc News & Analysis

Why Selectica Bolstered Contract Management With Iasta

2014-9-June-blaine_mathieu.jpg

Selectica CEO Blaine Mathieu told us in April the latest version of his company's contract management solution is like CMS “on steroids.”

With the provider’s acquisition of Iasta this month, Selectica could be banned from Major League Baseball for steroid use.

Iasta, a Gartner leader in its 2013 Magic Quadrant for Strategic Sourcing Application Suites, brings to Selectica its suite for upstream procurement solutions. Selectica’s wants Iasta to complement its own contract management solution.

“We started as a strategic partnership, but it became apparent that we could be much more powerful together than apart,” CEO Mathieu said. 

Do You Know When Your System Is Breached?

Information security professionals are always chasing to catch up with the bad guys.

Traditional information security (or cybersecurity) is focused on preventing unauthorized access to your network, systems, applications, infrastructure and data.

But, as we all know only too well, the people trying to get in are exposing and exploiting vulnerabilities faster than we can plug the holes. 

Surveys of security professionals around the globe report that more than 80 percent of companies know they have been hacked. The roughly 15 percent who did not report being hacked probably don’t know -- they just haven’t detected it yet.

Is NSA Leaker Edward Snowden the Info Governance Champ?

AIIM information governance in the enterprise 320 x 240.jpg Whatever you think of US National Security Agency leakerEdward Snowden, you have to concede he has done a lot for information governance (IG). He didn't build the ultimate IG technology.

But his behavior over the past 12 months have forced a large number of organizations to sit down and ask themselves, "What if?"

What if your information is not governed properly?

New research from AIIM shows only 10 percent of organizations have an effective IG policy in place, while 21 percent have polices that are mostly ignored. Most of the rest consider IG a work in progress.

The Age of Continuous Compliance

Today’s governance, risk and compliance landscape is complicated and difficult to understand, let alone implement and maintain. Those under pressure to maintain environments held to standards set by external regulatory control (and usually internal policies and best practices) have a difficult task.

Finding Common Ground with Information Governance

2014-27-May-Joint-Meeting.jpgIf you've been at an organization where compliance, IT and the business seem to speak different languages when they talk about information management, you know how difficult it is to get them all on the same page. The task is so difficult at most organizations that each typically does their own work -- blinders on -- in isolation from one or both of the other two in an effort to simply get something done. The results for the organization range from less than optimal (wasted time and money) to disastrous (smoking crater fines/penalties and massive operational disruptions).

When working with clients, I liken this state of affairs to whatever the political debate du jour is on the news -- where both sides are seemingly speaking different languages and there’s no agreement on the common ground.

Big Data Bits: Cloud, Security, Power, Analytics Edition

Hadoop, Hadoop distros and the technologies and analytics around big data keep getting more widespread and more pragmatic to use because the benefits of leveraging them are now both proven and obvious.

Rather than pontificate further, we’ll just bring you the notable news we think is worthy of your attention. 

3 Vendors that Make Information Governance Cool

2014-13-May-Female photographer with sunglasses.jpg

For passing the buck, there's nothing quite like information governance. It's an IT space in which everyone gets to blame everyone else and no one has to take responsibility for errors. The heart of the problem, Gartner says, is that it is difficult to measure and locate accountability and responsibility. 

But this traditional view of governance is changing. As organizations digitize their customer relationships, the way information is synchronized and shared with trading partners is becoming a core business responsibility. 

And these three vendors excel.

Selectica CEO Boasts 'We're Like a CMS on Steroids'

Blaine.jpgSelectica CEO Blaine Mathieu said the latest version of his company's contract management solution makes it easier for corporate executives and their teams to control risk, create opportunities and deliver business value.

The company's Contract Lifecycle Management (CLM) version 6 release includes a host of additional features, including advanced integrations with DocuSign and Salesforce, added support for Microsoft Office and new contract packages that enable users to create and version multiple contracts with a variety of templates as well as check-out, check-in and compare documents simultaneously.

It also offers a variety of customer experience enhancements, including improved search, faster navigation and an improved user interface.

BYOD: Mixing Work and Play While Minimizing Risk

Just a few years ago, there was a clear divide between employer-owned, work-related devices and user-owned personal devices. But as more and more employees bring their own notebooks, tablets and smartphones for work and for personal purposes, that divide is shrinking and in some cases, shattering.

How to Avoid SharePoint Governance Mistakes

2014-02-April-SharePoint-Governance-Segments

If you're wondering what your SharePoint governance plan should look like, look around you. It should probably look a lot like your organization.

There's no such thing as a one-size-fits-all approach, even if you're in an highly regulated industry like healthcare of financial services that imposes strict regulations on information sharing. At least that was the consensus of a panel of experts from Avanade, HiSoftware, Portal Solutions and Metalogix in a webinar today.

The panel explored some of the most common mistakes about governance in SharePoint, but focused more on common misconceptions that surface when companies set out to create their governance plan. While there are some fine examples of governance plans, the panelists said no template is automatically right for your organization.

5 Questions Boards Should Ask About Risk Management

Risk management exists in a dynamic world and should have the agility required to address the changing demands of business. The insightful article "Five Questions Directors Should be Asking in 2014" gets to the point quickly and its few questions serve as a good guidepost.

Can Security and Compliance Coexist?

Both security and compliance are all about establishing (and implementing) standards that ensure an environment where company assets and data is accessed and utilized properly. So if you were asked, “Do you think security and compliance really coexist?” you’d most likely think it a dumb question and say, “Of course.”

But what if we challenge that notion a bit -- not so much to explore if they can coexist, but whether they do.

End-to-End E-Discovery in Office and Office 365 #SPC14

Microsoft’s messaging on e-discovery hasn't changed much since it first launched the service two years ago, but some recent notable changes give it a better position for luring in new customers. If you've never seen the e-discovery platform on the Microsoft stack, start with my first article on the topic as a primer -- it provides the necessary background for understanding what's happened in the last two years. During a session at SharePoint Conference 2014, Quentin Christensen, program manager at Microsoft, provided details on the overall e-discovery story in Office and Office 365.

What's Riskier: Ignoring or Implementing Big Data?

Information security practitioners, risk professionals and executives might be blinded by the potential risks of implementing big data and thereby miss out on the value it can provide an organization. ISACA recently released a paper on Big Data which weighs the two sides and makes a clear decision which is the bigger risk.

What the NSA Can Teach Us about Finding Documents: 6 Tips on Metadata

NSAmetadata.jpgHow come the NSA knows who I spoke to last Nov. 10 at 11 a.m. and for how long, yet I can’t find the phone number of a colleague I called last night?

It’s simple -- metadata.

Displaying 16-30 of 333 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next >