HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Risk News & Analysis

Metalogix Tackles Those Tricky Email Migrations

Metalogix Email Migrator 3.jpg

Very soon, your organization is going to be moving a large amount of content to the cloud, for financial reasons if nothing else. That can be especially tricky when the content involves email, which brings its own set of headaches.

Metalogix says it can ease your pain with its recently released Email Migrator 3.0, which enables organizations migrate mailboxes to another Exchange server or Office 365.

BYOD: Mixing Work and Play While Minimizing Risk

Just a few years ago, there was a clear divide between employer-owned, work-related devices and user-owned personal devices. But as more and more employees bring their own notebooks, tablets and smartphones for work and for personal purposes, that divide is shrinking and in some cases, shattering.

Enterprise Collaboration Tools a 'Must' For Business Success

AIIM lede.jpgMost organizations see collaboration as crucial to their success, but nearly two-thirds of those organizations feel confused about the dovetailing of collaboration and social tools.

And while document and content sharing outside the firewall is considered a necessary evil, many onsite systems have been secured against access to outside systems, forcing business workers to rely on unsecured file sharing systems.

These results and more from recent AIIM research points to a C-Suite that favors collaboration, but puts many obstacles in the way to achieving it.

Businesses Should Manage Records - Not 'Keep Everything'

paper and more paper.jpg

Many businesses claim they have been busy over the past two years developing and implementing records and information management strategies. But scratch the surface and you find many of those strategies aren't especially effective.

Blame a lack of employee engagement, a lack of commitment at the management level and the absence of meaningful ways to measure the strengths and weaknesses of these efforts.

IBM, AT&T Extend Partnerships For Enterprise, IoT Security [Infographic]

In the wake of last week’s announcement that IBM and AT&T are getting together to support the development of the Internet of Things (IoT), many have expressed concerns about IoT and security. It seems, though, that both companies anticipated this and have announced plans to develop simplified, single-source network security products.

Will Alliance with AT&T Bring IBM Closer to the Internet of Things?

smart city.jpg

The $19 trillion Internet of Things (IoT) may be closer than you think. Two of the world's biggest companies -- IBM and AT&T -- just entered into a global alliance to develop solutions to support the IoT. 

According to a joint statement from the two US giants, the companies are combining their analytic platforms, cloud and security technologies "with privacy in mind" to gain more insights on data collected from machines in a variety of industries.

The alliance will focus on creating new solutions initially targeted for city governments and midsize utilities — organizations that intend to integrate and analyze vast quantities of data from assets such as mass transit vehicles, utility meters and video cameras, Mobeen Khan, executive director of Mobility Marketing at AT&T Business wrote in a blog post.

The Business Benefits of Hybrid Online File Sharing

file transfer.jpg

Fie sharing is making inroads into the enterprise content management (ECM) market as business users look for easier ways to shunt content around the enterprise. But recent research shows even the file sharing market is evolving with many users now looking for hybrid cloud/on-premises solutions, as opposed to the pure cloud-based approach.

In effect, many online file sharing (OFS) users are now looking for ways to store at least some of their data on-premises as an alternative to storing that data in third-party data centers, reversing the current trend to move everything to the cloud.

Microsoft Tries to Relieve Security Fears with Office 365 Makeover

Office 365 security authentication.jpg

Microsoft appears to be getting jumpy about the security of Office 365 and Yammer. That is not to say that there have been any recent events to make users nervous.

It’s just that over the past two days, Microsoft has announced the introduction of multi-factor authentication for Office 365, including security enhancements for those using Yammer in SharePoint.

HP Autonomy Clouds E-Discovery Trend

Clouds from plane.jpg

If we’ve been carrying on a lot recently about HP Autonomy, it's only because it seems HP has finally cranked up the gears. It's starting to develop Autonomy as an asset rather than looking at it through the lens of the disastrous acquisition process that still hasn’t finished. The latest release is a new cloud-based e-discover offering.

While HP is promoting this as a new product, it's just an old product migrated to the cloud. That makes it accessible not just to big businesses and major law firms, but also to companies in the lucrative small-to-medium business (SMB) market.

We Know What You'll Be Eating During the Super Bowl [Infographic]

Super Bowl teaser.jpg

Hunches are good, but data is better, so says best-selling author Dan Pink. And in a world of big data and sophisticated analytics, why would you even want to go on a hunch, especially when there’s so much great data available?

Maybe because, in this day and age, huge volumes of variable data come at you with such great velocity that it’s difficult to get an accurate picture of what it’s telling you. Especially if it’s all loaded into a spreadsheet.

And, even if you’re OK with jockeying spreadsheets, chances are the people with whom you want to have conversations and collaborate about the data are not. When they see you coming at them with an Excel file, they’ll run the other way. Send the e-mail with an .xls attachment and they may “accidentally” delete without reading …

 

Zettaset and MicroStrategy Deliver Secure, Big Data Insight #MSTRworld

hadoopornohadoop.jpgOK, so it’s not popular to say so, but Hadoop has some real big problems. Among them, the security vulnerabilities that exist “at every layer of the stack,” according to a blog post penned by Gartner analyst Merv Adrian.

So it goes to follow that the enterprises who turn a blind eye to those vulnerabilities might be headed for trouble.

That being said, companies who fail to identify data-driven insights and make decisions around them could be digging their own graves.

Reflections on Strategic Risks: What's in a Name?

risk.jpgSurveys say people are paying more attention to so-called “strategic risk.” 

HP Shares 4 Emerging Cloud Computing Trends

Cloud computing is growing up. It has matured from an easy solution to a difficult on-premises IT deployments that saved a few bucks of initial capital investment and now, finally, to one of the core elements of an organizations’ IT strategy.

MSFT Plugs Office 365 Vulnerability, But Trust May be Leaking

Leak of trust.jpg

Microsoft has closed-off a cross-site scripting (XSS) vulnerability in Office 365. The vulnerability, if exploited, could have enabled anyone with a mailbox in an enterprise using Office 365 to obtain administrative permission over the entire company’s Office 365 environment. What does that do to your level of trust in the product?

Cisco: Misplaced Trust the Biggest Threat to Enterprise Security

enterprise trust.jpg

The current forecast for cyber security in 2014 is “grim” and has the potential to get even worse, according to new research from Cisco. The report concludes that if technologies like cloud computing and the growth in the use of mobile technologies are creating a wider landscape for hackers to work on, then trust is the open door letting hackers into systems.  

Displaying 1-15 of 146 results

< Previous 1 2 3 4 5 6 7 8 9 10 Next >