Good Technology

Security risk management News

View All News

Security risk management Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Security risk management Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Consumer expectations, GDPR complicate data privacy protection

    Xerox CISO Alissa Johnson says U.S. companies will be forced to reconsider their information protection strategies as consumers' data privacy protection expectations evolve. Continue Reading

  • Features disaster recovery-as-a-service providers must offer

    A cost-effective disaster recovery as a service lets organizations of all sizes implement a dependable disaster recovery plan. Disaster recovery-as-a-service providers replicate or back up customer data to cloud data centers and then -- should disaster strike -- host and run applications remotely. There's a lot of room for disaster recovery-as-a-service providers to develop features specific to their DRaaS products, which can make sorting through those offerings daunting. Learn about the four key capabilities to look for when comparing DRaaS vendors to ensure the one you choose can handle the full range of potential disasters.

    Data that goes into cold storage is often kept for compliance and, increasingly, for big data analysis. Such data is infrequently or never accessed. Typically cheaper and lower performing than primary or secondary storage, cold storage systems are designed for storing such data. Enterprises may need to make this data warm or hot at a moment's notice, though, complicating cold storage design and increasing costs. Initially based on automated tape libraries and optical jukeboxes, cold storage systems have evolved to encompass Linear Tape File System and object storage as the amount of unstructured data has grown in recent years. Software for managing unstructured data has changed the cold data landscape as well.

    Employees often access and synchronize corporate data from a variety of consumer-grade sync-and-share services, putting the organization at risk. Enterprise-grade file sync-and-share -- available via the cloud, on premises or in hybrid modes -- includes enhancements to ensure security and compliance. Such features vary among vendors, but there are certain ones you should always look for to maintain data integrity and security.

     Continue Reading

  • Honey, I shrunk the app: Micro apps herald new age of mobile dev

    Applications built decades ago weren't meant for today's mobile workflows. That's why mobile application development platforms are evolving to take into account the data users need from those legacy systems. Developers can create micro apps, which serve single purposes and pull in information from back-end databases. This month's cover story explores the tools behind micro apps and how applications have evolved from the complex beasts they once were.

    But as organizations turn their attention to micro apps for mobile devices, they must also consider offering unified workspaces to users across different endpoints and OSes. One columnist discusses this trend, while another provides some tips for eliminating common mobile strategy roadblocks. Also in this issue, expert Gabe Knuth gives an overview of user experience monitoring for virtual desktops. And the Device Spotlight shines on Lenovo's ThinkPad X270.

     Continue Reading

View All Evaluate

Manage Security risk management

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Security risk management Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly.com

Close