HOT TOPICS: Customer Experience Marketing Automation Social Business SharePoint 2013 Document Management Big Data Mobile DAM

Security News & Analysis

Kofax Digitizes Transaction Management

document-management-roll-up.jpg

Kofax, recently acquired by Lexmark, is back again — and this time, it's offering end-to-end digital transaction management.

Not the hottest end of the document management space, you might think.

However, with the new capabilities added to the Kofax TotalAgilty platform, you get some serious functionality that can securely automate both your financial transactions and the paper-based transactions around it.

Now that’s pretty hot.

Office 365 Gets Customer Lockbox & More

2015-22-April-locked

Cloud weary managers might have reason to reconsider using Office 365.

In an opening keynote at the RSA Conference in San Francisco this week, Scott Charney, Microsoft’s corporate vice president for Trustworthy Computing, announced Customer Lockbox for Office 365.

It may be the most important security announcement around Office 365 that Microsoft makes this year, according to Julia White, Microsoft’s general manager for Office Product Management.

Metalogix Moves Into Social Media Archiving

Metalogix is back to business-as-usual after the MetaVis buy with the announcement this morning of a triple release across its Files and Exchange offerings, as well as new module that protects enterprise brands in social media settings.

The Archive and Files upgrades promise universal mobile access along with enhanced security and compliance features. But the company expects the new social module to be the real crowd pleaser.

To find out more, we talked with Hudson Casson, the company's global director of marketing and product strategy.

The Surprising Scarcity of IT Security Talent

2015-20-April-water-shortage.jpg

No, it is not your imagination: good IT security help is hard to find.

So says a new survey by ISACA and RSA Conference, which reports that 82 percent of organizations expect to be attacked in 2015 – yet acknowledge that they have talent pool that is largely unqualified and unable to handle complex threats.

More than one in three companies or 35 percent are unable to fill open security positions, according to the report, The State of Cybersecurity: Implications for 2015.

Given that online security has been a brewing issue for years — and that universities and colleges have not been shy about promoting their computer science departments and degrees — it is fair to wonder what the heck is going on. Are these IT skills really that scarce and difficult to acquire?

5 Ways Digital Work Will Change Data Centers

The structure of data centers is changing. Gartner attributes this to the growth of the Internet of Things (IoT) and increased investment in what it describes as the Nexus of Forces — technologies primarily built for cloud, social, mobile and information management.

For much of the past 40 years, data centers have been staples of the IT ecosystem. However,  IT departments need to develop new strategies for managing their data centers or business agility and competitive strength will be compromised.

The solution, Gartner suggests, is to develop new data center strategies for the digital world, according to a recently released report.

Have You Heard About Exchange Server 2016?

Microsoft has been tight-lipped about its plans for Exchange Server 2016, the on-premises release that it plans to ship in the second half of 2015.

Until last night, that is.

While it won't make the big reveal until Microsoft Ignite kicks off in Chicago early next month, the new release will focus on productivity, collaboration and information governance, according to a blog post by the Microsoft Exchange Team.

The team hinted that many of the changes will be familiar to Office 365 users, noting, "Most of the new features in Exchange Server 2016 were birthed in the cloud and then refined in a feedback loop that includes millions of mailboxes deployed worldwide."

HP Builds Mobile Compliance Cred With New Product

HP has planted a stake in the ground in a space of growing importance to companies: managing compliance and security in internal communications in the mobile environment.

Specifically, the company launched HP Connected MX, a product it describes as enabling "organizations to confidently deliver information accessibility to their mobile workforce while facilitating organization visibility, control and protection of information at the edge."

Translation: it is a connected back up solution that keeps employees and other internal users from accidentally or carelessly sending sensitive information to an insecure smartphone or laptop.

Mimecast Wants You to Trust Business Email to the Cloud

A new, web-based secure messaging system announced this morning by Mimecast aims to address the continuing problem of malicious payload passing through email.

Mimecast’s strategy with its simply named Secure Messaging service is not entirely new: Direct Outlook to upload email attachments to a web gateway, encrypt them there using AES protocol and let browsers manage the transfer of the encrypted attachments through secure sessions.

What's new, however, is Mimecast’s appeal to customers. Please trust a cloud for your security.

“We do retain data in the cloud, so you can archive perpetually with us,” said Orlando Scott-Cowley, Mimecast’s director of technology marketing and a certified security engineer, speaking with CMSWire. “Or alternatively, if you have legal concerns about security and privacy of using a cloud service, we have a zero-drag or zero-retention which just sends the mail straight through to the organization.”

Ex-Ektron Pres Tim McKinnon Now Sonian CEO

Tim McKinnon — the man who steered Ektron through its merger with EPiServer before leaving the company himself — started a new job this week. And he said he couldn't be more excited about the opportunity to take the helm of a small but growing company.

The former Ektron president is now president and CEO of Sonian, a Dedham, Mass-based provider of cloud-based archiving. Founded in 2007, the company helps businesses preserve, retrieve and "bring meaning to their vast expanse of data," McKinnon claims.

"It's a perfect fit," McKinnon told CMSWire today. "It matches what I like to do with what the company needs."

Microsoft Adds More Security to Select Office 365 Plans

Microsoft is introducing a new security layer to Office 365 with advanced threat protection for Exchange for Office 365 government and business users.

Now in testing, Microsoft expects it to be generally available later this summer.

While Microsoft has made much about the security of Office 365, it's a constant challenge to stay ahead of spammers and other malware producers.

Why You Need to Scan for Open Source Vulnerabilities

Remember the good old days of open source, when your main concern was whether you might have inadvertently violated a license or piece of intellectual property? And if you did, well then at worst you'd have to turn over a piece of that software code to the open source community?

Those days are over, of course. Or rather, while the risk of misusing open source remains, there are far bigger dangers -- with corresponding consequences.

Does Lexmark Have What it Takes to Be an 800 Pound Gorilla?

2015-07-April-Gorilla.jpg

Where does an 800 pound gorilla sit?

Anywhere it wants.

And in the case of Lexmark, it wants to sit in the enterprise software space.

Brian Anderson, Chief Technology Officer for enterprise software at Lexmark, told CMSWire that the combination of Lexmark's hardware business, plus the enterprise content management capabilities gained through its 2010 Perceptive buy, plus the business process management spoils from its recent Kofax acquisition will turn Lexmark into an 800 pound gorilla.

Brace Yourselves for More Enterprise Social Network Attacks

2015-2-April-hackers.jpg

Enterprise Social Network (ESN) providers should be on alert in light of Slack's reported security breach last week.

ESNs are particularly vulnerable to database system hacks because their information is gold to corporate hackers, industry analysts told CMSWire.

“Social networking footprints are valuable to identity thieves because they come with all that biographical data like birth dates, localities and relatives, and all the additional descriptive stuff like your friendships that help to identify you,” said Steve Wilson, vice president, principal analyst and lead on digital privacy and safety for Silicon Valley-based Constellation Research.

“Skilled thieves,” Wilson added, “use this data to impersonate you at call centers and in online registration channels, to perpetrate fraud in your name. With workplace social networking, the game is much the same but the stakes are much higher.”

Marc Benioff Shops Again, Buys Mobile Security Startup

Maybe Salesforce CEO Marc Benioff’s corporate shoppers were ducking in-and-out of SXSW sessions last month looking for smart acquisitions. If so, then they not only learned How to Rob a Bank, but also spotted a genius buy in Toopher.

Its co-founder and CTO Evan Grim, in his personal LinkedIn profile, describes Toopher as “an invisible, location-based multifactor authentication solution designed around user behavior and powered by your phone's location awareness."

Grim claims by blending strong technology with lean and thoughtful user experience, "Toopher automates the authentication process via your phone, making it 'go invisible' -- not only preventing online fraud and identity theft, but creating a security solution that people actually want to use. No more passwords hacks, no more codes. It's simple, secure, and your phone stays in your pocket.”

Toopher’s hometown newspaper, the Austin American Statesman, confirmed the sale last night. The purchase price, as far as we can tell, hasn’t been revealed.

The company’s name,”Toopher” is a play on the term “two factor.”

Who Is Your Weakest Link? The Risks of Cloud Partners

2015-31-March-weak-link.jpg

Think your organization is safe if it minds its own security?

Think again.

You’ve also got to worry about security at all those companies you associate with, from suppliers and consulting firms to PR agencies, systems integrators, event planners and even heating and cooling vendors.

Displaying 1-15 of 501 results

< Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 Next >