DCIG is pleased to announce the availability of its DCIG 2014-15 Security Information and Event Management (SIEM) Appliance Buyer’s Guide. In this Buyer’s Guide, DCIG weights, scores and ranks 29 SIEM appliances respectively from nine (9) different providers. Like all previous DCIG Buyer’s Guides, this Buyer’s Guide provides the critical information that all size organizations need when selecting a SIEM appliance to help provide visibility into their security posture by providing usable and actionable information.
Category: Governance Risk and Compliance
Data security is a part of the IT infrastructure that should take care of itself. Companies have enough to worry about without always looking over their shoulder to make sure no one is stealing vital information. As most organizations recognize, this is NOT the case.
One of the most exciting and terrifying times in the lifecycle of a company is transitioning from a small to mid-range or mid-range to enterprise sized company. Well led companies that survive those transitions have often been planning for the occasion for some time. The longer they have been planning the more likely they’ve become aware of the need for long term archiving. Of everything.
DCIG is pleased to announce the release of its 2014 Mobile Data Management (MDM) Buyer’s Guide that weight, score and rank over 100 features. Like previous Buyer’s Guides, this Buyer’s Guide provides the critical information that organizations need when selecting Mobile Data Management software to help meet the security, compliance and Bring-Your-Own-Device (BYOD) challenges in an ever increasing mobile enterprises.
One of the most common initial use cases for cloud storage is for the storage of archival data. However that does not mean every organization is quite ready to move all of their archival data to the cloud or, what they do move to the cloud, trust the cloud to be available to provide access to the data when they need it. In this fifth blog entry in my interview series with C2C Systems’ CTO Ken Hughes, he talks about the importance of having access to cloud storage repositories for archival data and the advantages of keeping on-premise and data in the cloud synchronized.
Predictive Analytics across the Enterprise: From eDiscovery to DoJ Second Requests to Proactive Protection of Intellectual Property
The accelerating increase in the volume of Electronically Stored Information (ESI) is resulting in knowledge workers reaching a point where they may not be able to utilize traditional data management and analytic technology and processes to keep pace. However, the increases in knowledge worker productivity and decreases in eDiscovery costs made possible by predictive analytic technology are coming to the point where they are applicable to other knowledge management tasks within the enterprise.
Faced with the accelerating increase in the volume of Electronically Stored Information (ESI) and the emergence of the concept of Big Data, enterprises worldwide need next generation IT systems to fulfill their corporate compliance, information governance and eDiscovery requirements to process and analyze all of this data. It is in response to this demand and the result of recent legal precendents that Technology Assisted Review (TAR), also known as Predictive Coding or Computer Assisted eDiscovery, is emerging as a legally viable and court-recognized option.
How to Wipe Company Data on Employees’ Mobile Devices while Leaving Personal Data Alone; Interview with GroupLogic, Part V
In this final installment of our interview series with GroupLogic we look at how mobilEcho enables organizations to wipe only company data off employees’ mobile devices, leaving the employee’s personal data untouched. We also hear how GroupLogic is helping telecommunications firms increase revenue by adding value to their customers’ telecommunications experience, and we gain insight into the DNA of the company as a software provider for over 20 years.
GroupLogic explains Symantec and Commvault partnerships, ahead of acquisition by Acronis; Interview with GroupLogic, Part IV
GroupLogic, a secure enterprise file sharing and syncing solutions provider, is all about responding quickly to customer demands for product features. On September 13th, Acronis announced it had acquired GroupLogic.
In our previous installment of this interview series, we examined how GroupLogic engages in “customer development” in lieu of product development to integrate customer-driven innovations into its products. In part 4, we take a look at GroupLogic’s strategic partnerships with other companies to create products that fulfill very specific needs for customers.
Locking Down the Enterprise Cloud while Keeping It Simple and Easy to Use; Interview with GroupLogic, Part II
In part 2, we continue our discussion with GroupLogic’s Anders Lofgren, Vice President of Marketing and Product Management, by exploring licensing options and how the enterprise mobility space has opened up a new market for the company. As well, we dig deeper into activEcho and learn how it is designed to provide flexible and secure file-sync-and-sharing in the enterprise IT organization while being as simple and easy to use as one of the most popular–but unsecure–consumer grade file-sync-and-share cloud services today.