ResearchThe application-defined data center
Enterprises can use data centers and cloud computing together to meet the infrastructure needs of emerging applications and new requirements. Read more »
{"source":"http:\/\/search.gigaom.com\/property\/research\/wijax\/383af13036138b805db0da550b1f5914?tag=data-security","varname":"wijax_a39d47e496e7254f9082e1e203061593","title_element":"h2","title_class":"widget-title","title_before":"%3Ch2%20class%3D%22widget-title%22%3E","title_after":"%3C%2Fh2%3E"}
Alerts notify you of new stories or reports as soon as they are published. They are delivered via email and can be customized by topic and frequency.
Keep an eye on the future, by getting new results in your inbox.
Use the filters below to edit your Alert.
Enterprises can use data centers and cloud computing together to meet the infrastructure needs of emerging applications and new requirements. Read more »
Shadow IT may seem like an easy solution, but stakeholders can end up with less than they wanted and put an organization’s data assets at risk. Read more »
In the era of big data, organizations must employ a combination of security analytics, intelligence-aware security controls, and automated response to reduce risk and business disruption. Read more »
Strict E.U. regulations on data privacy have left Iceland as a key location for corporate cloud-hosting providers. Read more »
Businesses are making progress in creating and enforcing employee policies for mobile devices, but may be naive regarding insider threats, including the inadvertent misuse of data by employees. Read more »
Contrary to its popular image, Apple’s successes have more often come from fixing what’s broken than from building anew. And that puts today’s credit card payment system right in Apple’s wheelhouse. Read more »
As Hadoop moves towards establishing itself as a key data management platform for the enterprise, there is a new set of challenges it must meet to be regarded as a true… Read more »
Companies often rely on mobile-device management systems as a key element in their protection strategy. But they also need deep and broad visibility across mobile devices combined with the capability to… Read more »
The adoption of mobile security measures is more than applying minimal safeguards against viruses and hacks; it is about enabling greater utility and productivity. Read more »
The operational cost of normalizing and mining human-generated data is significant and requires a sound strategic understanding of technologies and business goals. Read more »