Enterprise Data Governance News
October 09, 2015
News roundup: The EU Court has invalidated the Safe Harbor agreement, leaving companies scrambling to deal with overseas data transfers securely. Plus: SHA-1 collision attack; NIST email security initiatives; worry over cyberthreats.
July 23, 2015
The National Guard reported an accidental data exposure affecting thousands of former and current employees was not related to the OPM breach.
June 12, 2015
Gartner predicts that by 2020 the rise of the Internet of Things will have far reaching effects on information security, including IoT security forcing better planning in physical safety and data handling.
May 08, 2015
News roundup: Contradicting mobile malware statistics published this year prove the mobile malware debate is alive and well. Plus: SAP vulnerabilities; spam-sending Linux malware; criminal attacks leading healthcare threat.
Enterprise Data Governance Get Started
Bring yourself up to speed with our introductory content
Expert Bill Hayes examines the strengths and weaknesses of top-rated data loss prevention (DLP) products to help enterprises make the right purchasing decision. Continue Reading
Better corporate data protection demands foresight and concrete action. Learn why breach training, monitoring and early detection capabilities can minimize damage when hackers attack. Continue Reading
To ensure the future of information security, enterprises must learn from the past, launch proper training and install the right technologies. Continue Reading
Evaluate Enterprise Data Governance Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Bill Hayes maps specific data loss prevention products to three deployment scenarios to better help readers make their own purchase decisions. Continue Reading
Third-party DNS providers claim to improve browsing times and speeds, but are they a secure enterprise option? Expert Michael Cobb explains. Continue Reading
Before deploying and implementing a data loss prevention product, enterprises should have an effective data classification policy in place. Expert Bill Hayes explains how that can be done. Continue Reading
Product ReviewsPowered by IT Central Station
Very powerful options in terms of Data Profiling, Data De-duplication, and programming complex data cleansing rules.Powered by IT Central Station
Improvements to My Organization: I’ve used this product in multiple ways. Initially, I integrated it with QAS address software to validate...Continue Reading
Powered by IT Central Station
Valuable Features: Connectivity with SAP and low impact on SAP environments. Also overall stability of the product. • Improvements...Continue Reading
Auto documentation & recovery of jobs are valuable but when working with custom functions, repeatedly fails to execute.Powered by IT Central Station
Valuable Features: Impact and Lineage analysis. Auto Documentation. Recovery of jobs. Text Data Processing. • Improvements to My...Continue Reading
Manage Enterprise Data Governance
Learn to apply best practices and optimize your operations.
Expert Bill Hayes examines five technologies that can complement data loss prevention products and improve enterprise security. Continue Reading
This Security School covers corporate data security risks in this day and age, and offers tips to help enterprises limit the effects of a security incident. Continue Reading
News of government surveillance programs is appearing almost daily. Enterprises need to do what they can to protect corporate data from potential eavesdropping -- but how? Expert Kevin Beaver offers some best practices. Continue Reading
Problem Solve Enterprise Data Governance Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Malware authors are using power consumption tracking-malware to eavesdrop on and attack mobile devices. Expert Nick Lewis explains the threat and how to defend against it. Continue Reading
Remote wipe is the option most people think of when looking to erase data on mobile phones, but it isn't always the most effective. Expert Nick Lewis explores how to fully remove data from a device. Continue Reading
Securing credit card data -- both online and at brick-and-mortar stores -- requires security measures beyond those mandated by PCI DSS. Expert Philip Alexander outlines six out-of-band security controls to consider. Continue Reading