James Nagurney - National Business Development Manager
James Nagurney
National Business Development Manager
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Rich Faille - Director of Mobility Practice
Rich Faille
Director of the Mobility Practice
Tony D'Ancona - Vice President of Professional Services
Tony D'Ancona
Vice President of Professional Services
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More

Data

We have searched the depths of our blog to provide you with the latest IT articles on Data. Get Connected Today!

Microsoft Azure

Developing Just Got a Whole Lot Easier

by Patrick Renzi | 11.13.14

Want an open and flexible Cloud platform that helps you move faster, do more, and save money?  Sound too good to be true? Let me introduce you to Microsoft Azure. It’s a growing collection of integrated services—compute, storage, data, networking, and app—that lets you develop enterprise-ready APIs fast using a wide range of operating systems, frameworks, and languages to ensure great performance for your customers. Intrigued? Read on…

Tags:Cloud ComputingCloud StorageDataMicrosoftMicrosoft AzureNetworkingStorage

Few things are more important to your company than the protection and proper management of data. Just as you wouldn’t hand over the keys to your home to a total stranger, you shouldn’t entrust your company’s information systems to a third party without thoroughly vetting them. Here are some of the important qualities to look for.

Tags:ComplianceDataNetworkingSecurity

Risk Assessment

Don’t Short-Change Your Risk Assessment

Special Risk Circumstances

by Stephen Nardone | 10.21.14

While there are commonalities to most risk assessments, companies in regulated industries that store sensitive customer data must follow additional government-mandated protocols. The overall goal is to gain an understanding, from an end-to-end perspective, of what the current risk is to your environment. However, a full Security Assessment can be targeted against compliance-related areas, like PCI or HIPAA.

Tags:BYODCloudComplianceDataDeviceSecurity

Risk Management Process

Any competent IT professional will tell you that one of their top priorities— probably the top priority—is securing their enterprise’s data and network. Indeed, CIOs typically allocate a healthy chunk of their overall IT budgets to security.

Concern, however, does not always translate into competence, or even common sense. Further, throwing money at a problem without first properly assessing and prioritizing an enterprise’s unique IT-related risks actually can create greater vulnerability. You can’t just buy technology, put it in your environment, and assume that your assets are safe.

Tags:DataNetworkingSecurity

The ‘Other’ CIA – Part of Achieving a Secure Storage Infrastructure

Plan, Audit, Integrate, Test — Keys to Storage Security

by Kurt Hildebrand | 10.01.14

In an era when data breeches can cost hundreds of millions of dollars, having a secure storage system is critical.

Tags:Cloud StorageDataSecurityStrategy

Follow Us
RSS Feed
Featured Bloggers
James Nagurney - National Business Development Manager
National Business Development Manager
Lane Shelton - Vice President of Software Business Development
Vice President of Software Business Development
Stephen Nardone - Director of Security Solutions and Services
Director, Security Solutions and Services
Tag Cloud
Loading Loading...