Archive for October 2015
Endpoint device management: Protecting the enterprise front door
Mobility and cloud computing have combined to obliterate any so-called network security perimeter. Corporate data has now been let loose to roam in a world of cyber thieves, manipulators and…
Read More20 hybrid cloud insights from top industry experts
One cloud does not fit all organizations. That’s true whether it is a public or private cloud. A hybrid cloud option allows your business to create a custom solution that…
Read MoreSecurity requires long haul planning
On Tuesday, October 6th, the European Court of Justice (ECJ), invalidated the U.S./EU Safe Harbor Framework. This framework, in place since 2000, gave blanket permission to data transfers from the…
Read MoreCybersecurity through enterprise risk management
Cybersecurity is top of mind for corporations around the world. The quantity of recent data breaches and the dollar loss associated with some of them indicates either an underinvestment in…
Read MoreCloud computing: A data-centric business model
According to the National Institute of Standards and Technology: “Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers,…
Read More