Results tagged "governance"
Total Search Results : 28
January 10, 2013 11:47 AMSorting through the alphabet soup language of IT service management (ITSM) can be tough, but it's worthwhile. Here's a handy guide to essential ITSM frameworks and standards.
March 29, 2012 09:00 AMAs data continues to grow in terabytes in the enterprise, classifying it based on its sensitivity has never been more important. According to a just-released InformationWeek report, 10 Steps to Effective Data Classification, an organizational classification program defines policy requirements; specific classifications, generally as “secret,” “private,” “confidential” and “public,” and their associated data types; processes and procedures; accountability metrics; and repercussions from not following the rules, according to author Erik Bataller, a senior consultant with information security consultancy Neohapsis.
February 29, 2012 01:00 PMEMC's consulting arm is introducing five security and risk management advisory services. "When you look at the services and the way we set this up, it's very much a reflection of our need to provide our customers with end-to-end solutions... framed under the broader umbrella of GRC--governance, risk and compliance," says Mat Allen, senior director, security and risk management global practice, EMC Consulting. "GRC acts as the center point."
February 28, 2012 11:00 AMData protection vendor Proofpoint is using this week's RSA Conference 2012 to announce it is partnering with the cloud-based file-sharing site Box.com to extend data protection to users of the popular service. Proofpoint already provides data protection as a service for a customer's e-mail, Web and social media communications to prevent sensitive customer or company data from being exposed. Just like social media, employees are choosing themselves to use file-sharing sites to get their work done, and IT managers need to adapt, a Proofpoint executive says
February 14, 2012 11:00 AMAs more and more businesses make their way into the cloud, the ability to manage various suppliers becomes far more complex--especially for large enterprises. Another issue for IT is that business groups are rapidly adopting cloud services, often independent from their IT. Procurement of cloud services from external suppliers by such business groups is creating "supplier sprawl," which obscures IT’s visibility into all cloud services and suppliers.
February 02, 2012 01:00 PMThe Topology and Orchestration Specification for Cloud Applications (TOSCA) Technical Committee recently formed by OASIS (Organization for the Advancement of Structured Information Standards), the not-for-profit open standards consortium, along with several IT vendors and consumer groups, will be good for facilitating cloud portability, industry observers say. The goal of TOSCA is to enable deploying cloud applications without vendor lock-in, while maintaining application requirements for security, governance and compliance.
November 24, 2010 08:53 AMIn the rush to adopt public and hybrid cloud computing services organizations appear to be ignoring the emerging risks to information governance - policy compliance and enforcement - according to a new report from EMC's Leadership Council for Information Advantage, a blue-chip panel of IT execs. Using IDC data, EMC says 75 percent of IT organizations are running or plan to deploy applications in a private cloud environment, but only 34 percent have a governance policy for cloud-based information. Over half -- 57 percent -- believe their organizations need to do more, and almost a third report they are not confident in their preparedness.
June 16, 2010 10:23 AMWhile growing numbers of businesses understand the advantages of embracing cloud computing, they are more concerned about the risks involved, as a survey released at a cloud conference in Silicon Valley shows. Respondents showed greater concern about the risks associated with cloud computing surrounding security, availability and performance than support for the pluses of flexibility, scalability and lower cost, according to a survey conducted by the research firm IDC and presented at the Cloud Leadership Forum IDC hosted earlier this week in Santa Clara, Calif.
May 13, 2010 09:00 AMAn analysis of the secure software development programs at 30 top companies provides a gauge against which organizations can measure their own initiatives. The second version of Building Security in Maturity Model (BSIMM "bee-sim"), released today, expands on the data set of last year's findings, which were based on interviews with nine companies. BSIMM is the work of three leading application security experts, Cigital's Gary McGraw and Sammy Migues and Fortify Software's Brian Chess.
May 11, 2010 08:00 AMA survey of organizations by Gartner conducted in December, 2009 that spanned nine countries -- four in Asia/Pacific, three in Europe, the U.S. and Canada totaling 270 companies either using SaaS or expecting to use it within the next year -- found larger investments planned compared with on-premises software, but that few had set up policies to govern its use.
Best of the Web
VXLAN is an Experimental IETF draft of protocols to enable the creation of a large overlay, multi-tenant network.
: OpenFlow is poised to reach over-hyped status, yet there are practical, useful reasons for keeping an eye on Openflow. The biggest cloud players are involved and driving the feature creation.
Get a primer on the Openflow protocol and what it can do for networking.