Enterprise data News
June 23, 2015
As self-service analytics software becomes more common, users are calling on vendors to beef up governance capabilities.
June 11, 2015
With mobile devices proliferating -- and security in healthcare lacking -- providers are ramping up efforts to better safeguard devices and related apps.
April 28, 2015
A panel discussion at RSA Conference 2015 outlined strategic methods enterprises can use to build and advocate for an insider threat program.
March 31, 2015
Microsoft provides Office 365 MDM at no cost, giving subscribers basic capabilities for mobile device management and the option of upgrading to the paid service Intune.
Enterprise data Get Started
Bring yourself up to speed with our introductory content
Big data can lead to bigger problems, as enterprises struggle to process, store and organize information of varying levels of importance and ownership. Continue Reading
Android is a popular mobile OS among consumers, but its well-known security gaps make many businesses pause. Test your knowledge of Android's data security. Continue Reading
Mobile application management, or MAM, has emerged as the leading technology to deliver and manage enterprise applications on workers' smartphones, tablets and other personal mobile devices. MAM also helps ensure the secure use of enterprise applications, and helps keep corporate data separated from users' personal information.
This three-part guide explains the birth of mobile application management, and details the various components of many MAM and enterprise mobility management tools. SearchConsumerization contributors also look at the ways MAM can meet the needs of both IT and end users: MAM lets IT administrators control data without locking down users' devices, which is beneficial for both parties.Continue Reading
Evaluate Enterprise data Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Matt Pascucci outlines three enterprise uses cases for mobile device management products to see how they can protect users, devices and corporate data. Continue Reading
Expert Matt Pascucci describes how implementing mobile device management products can protect smartphones and tablets, as well as enterprise networks and infrastructures. Continue Reading
What exactly is a chief privacy officer, and what can one do to help your organization? Expert Mike O. Villegas explains how a CPO could help improve security. Continue Reading
Manage Enterprise data
Learn to apply best practices and optimize your operations.
Shadow IT occurs when employees adopt cloud-based apps to complete tasks. This can lead to data loss, but there are ways to keep this from happening. Continue Reading
Security managers increasingly combine existing tools to implement an overall BYOD security posture. Key security features can make the job easier. Continue Reading
When mobile vendors stop maintaining security on their devices, enterprise data is at risk. Expert Michael Cobb discusses how to assess mobile product end of life and how to create end-of-life policies and controls to maintain BYOD safety. Continue Reading
Problem Solve Enterprise data Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Protecting corporate data is a big job, but IT has a wide variety of tools at its disposal when it comes to data loss prevention. Continue Reading
Thanks to mobile and cloud computing, the number of potential repositories for corporate data have increased exponentially. Traditional file storage systems, content management software and device-centric security measures can only do so much to organize and protect data that's constantly on the go. Cloud storage services, enterprise file synchronization and sharing (EFSS) and mobile content management (MCM) represent key alternatives in storing and providing access to corporate data in the new mobile cloud era. When implemented correctly, these technologies can provide secure data access to a mobile, distributed workforce. This guide explains how EFSS and MCM differ from -- and can work with -- traditional network shares to accomplish this goal. Continue Reading
I want to replicate DB2 from the mainframe to an AIX box since it's cheaper and the copy can be used for testing. Is this possible? Continue Reading