Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "governance"

Total Search Results : 28

The IT Governance Cheat Sheet

January 10, 2013 11:47 AM
Sorting through the alphabet soup language of IT service management (ITSM) can be tough, but it's worthwhile. Here's a handy guide to essential ITSM frameworks and standards.

Data Classification Tips And Technologies

March 29, 2012 09:00 AM
As data continues to grow in terabytes in the enterprise, classifying it based on its sensitivity has never been more important. According to a just-released InformationWeek report, 10 Steps to Effective Data Classification, an organizational classification program defines policy requirements; specific classifications, generally as “secret,” “private,” “confidential” and “public,” and their associated data types; processes and procedures; accountability metrics; and repercussions from not following the rules, according to author Erik Bataller, a senior consultant with information security consultancy Neohapsis.

EMC Rolls Out 5 GRC-Centered Security Services

February 29, 2012 01:00 PM
EMC's consulting arm is introducing five security and risk management advisory services. "When you look at the services and the way we set this up, it's very much a reflection of our need to provide our customers with end-to-end solutions... framed under the broader umbrella of GRC--governance, risk and compliance," says Mat Allen, senior director, security and risk management global practice, EMC Consulting. "GRC acts as the center point."

Proofpoint Extends Data Protection To Box File-Sharing Cloud

February 28, 2012 11:00 AM
Data protection vendor Proofpoint is using this week's RSA Conference 2012 to announce it is partnering with the cloud-based file-sharing site Box.com to extend data protection to users of the popular service. Proofpoint already provides data protection as a service for a customer's e-mail, Web and social media communications to prevent sensitive customer or company data from being exposed. Just like social media, employees are choosing themselves to use file-sharing sites to get their work done, and IT managers need to adapt, a Proofpoint executive says

HP Serves Up Multivendor Cloud Management

February 14, 2012 11:00 AM
As more and more businesses make their way into the cloud, the ability to manage various suppliers becomes far more complex--especially for large enterprises. Another issue for IT is that business groups are rapidly adopting cloud services, often independent from their IT. Procurement of cloud services from external suppliers by such business groups is creating "supplier sprawl," which obscures IT’s visibility into all cloud services and suppliers.

OASIS Targets Cloud Portability

February 02, 2012 01:00 PM
The Topology and Orchestration Specification for Cloud Applications (TOSCA) Technical Committee recently formed by OASIS (Organization for the Advancement of Structured Information Standards), the not-for-profit open standards consortium, along with several IT vendors and consumer groups, will be good for facilitating cloud portability, industry observers say. The goal of TOSCA is to enable deploying cloud applications without vendor lock-in, while maintaining application requirements for security, governance and compliance.

Information Governance In The Clouds

November 24, 2010 08:53 AM
In the rush to adopt public and hybrid cloud computing services organizations appear to be ignoring the emerging risks to information governance - policy compliance and enforcement - according to a new report from EMC's Leadership Council for Information Advantage, a blue-chip panel of IT execs. Using IDC data, EMC says 75 percent of IT organizations are running or plan to deploy applications in a private cloud environment, but only 34 percent have a governance policy for cloud-based information. Over half -- 57 percent -- believe their organizations need to do more, and almost a third report they are not confident in their preparedness.

IDC Survey: Risk In The Cloud

June 16, 2010 10:23 AM
While growing numbers of businesses understand the advantages of embracing cloud computing, they are more concerned about the risks involved, as a survey released at a cloud conference in Silicon Valley shows. Respondents showed greater concern about the risks associated with cloud computing surrounding security, availability and performance than support for the pluses of flexibility, scalability and lower cost, according to a survey conducted by the research firm IDC and presented at the Cloud Leadership Forum IDC hosted earlier this week in Santa Clara, Calif.

BSIMM Shows Best SDLC Practices

May 13, 2010 09:00 AM
An analysis of the secure software development programs at 30 top companies provides a gauge against which organizations can measure their own initiatives. The second version of Building Security in Maturity Model (BSIMM "bee-sim"), released today, expands on the data set of last year's findings, which were based on interviews with nine companies. BSIMM is the work of three leading application security experts, Cigital's Gary McGraw and Sammy Migues and Fortify Software's Brian Chess.

Organizations Slow To Adopt SaaS Governance Policies

May 11, 2010 08:00 AM
A survey of organizations by Gartner conducted in December, 2009 that spanned nine countries -- four in Asia/Pacific, three in Europe, the U.S. and Canada totaling 270 companies either using SaaS or expecting to use it within the next year -- found larger investments planned compared with on-premises software, but that few had set up policies to govern its use.

 1 | 2 | 3  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013

TechWeb Careers