enterprisesecuritymag

business

Android in Enterprise BYOD
Enterprisesecuritymag >> cxoinsights

Enterprises today are increasingly embracing the Bring Your Own Device (BYOD) trend by leveraging mobile devices like Microsoft Surface Pro and iOS enabled gadgets to access data anywhere, anytime, allowing employees to work flexibly. However,...

Implementing Software-Defined Everything in the Data Center
Enterprisesecuritymag >> cxoinsights

Jim Livingston, CTO, University of Utah Health

Healthcare organizations demand the highest level of data center security, performance and automation. In 2016, I realized that we had an aging infrastructure to support four hospitals and 10 community clinics. It was time to make a change, but I...

The Need for Identity & Access Management
Enterprisesecuritymag >> cxoinsights

Gehan Dabare, Managing Director for Identity & Access Management, MUFG

It has always been important to have a handle on who has access to what resources. If you don’t know who has access and who is who-how can you prevent bad things from happening? Managing who has access to resources is the foundation of any...

Data is the Lifeline of Today's Businesses; But Why Are So Many Business Leaders Still Making Guesswork?
Enterprisesecuritymag >> cxoinsights

Eric Thain, General Manager, HK Express

There is no doubt on the importance of data in today’s businesses. The C-Suite recognizes the need to focus on data and in fact, data and analytics ranks the highest of the top five investment priorities for CEOs today (according to the...

Fusion of Artificial Intelligence and Cloud Computing
Enterprisesecuritymag >> cxoinsights

The world of data production, interpretation, and storage is changing radically because the technology around the world is changing. New technologies like IoT, cloud computing, machine learning, and virtualization are fueling the technological...

Facing the Drift To Climb Security & Fraud's Everest
Enterprisesecuritymag >> cxoinsights

Thierry Derungs, Chief Digital Officer, BNP Paribas Wealth Management

I remember my first computer. In 1986, with my girlfriend (now my wife), we bought an incredibly expensive top personal computer with an extraordinary hard drive of 20Mb and the best modem to connect to Internet at 14,4kbit/s. Modem connection...

Innovate business models with SophiaTX: a revolutionary enterprise blockchain platform pushing adoption in the ASEAN
Enterprisesecuritymag >> cioviewpoint

KUALA LUMPUR – A successful enterprise blockchain event dubbed BUSINESS REDEFINED 2018 was held on September 25 at Suntec City, Singapore and September 27 at Connexion, Malaysia, representing the first step in building an ecosystem...

Be Proactive-Make Information Security a Priority
Enterprisesecuritymag >> cxoinsights

Donald Good, Director, Global Legal Technology Solutions, Navigant [NYSC:NCI]

The cyber threat has never been more complex or dynamic. Financial institutions, large and small corporations, medical providers, law firms, accounting firms, and government agencies are targeted with increasing frequency by highly skilled...

Be Proactive-Make Information Security a Priority
Enterprisesecuritymag >> cxoinsights

Donald Good, Director, Global Legal Technology Solutions, Navigant [NYSC:NCI]

The cyber threat has never been more complex or dynamic. Financial institutions, large and small corporations, medical providers, law firms, accounting firms, and government agencies are targeted with increasing frequency by highly skilled...

The Power of Technology for Non-Profit Organizations
Enterprisesecuritymag >> cxoinsights

Gail Hyde, VP-IT & CIO, Habitat for Humanity International

At Habitat for Humanity International, technology plays a large role in our efforts to help people build strength, stability and independence through shelter and transform communities around the world. Any nonprofit international nonprofits in...

Using Multifactor Authentication in Mainframe Security
Enterprisesecuritymag >> cioviewpoint

While using passwords is an age-old solution to protect important data, using it as the sole layer of security to manage access to critical data today is a recipe for disaster. Although it is simple and can be easily implemented, this approach is...

The Problem with I&AM (Identity & Access Management)
Enterprisesecuritymag >> cxoinsights

Gehan Dabare, Director for Identity & Access, Bank of Tokyo-Mitsubishi

It has ALWAYS been important to have a handle on who has access to what resources. If you don't know who has access and who is who - how can you prevent bad things from happening? Managing who has access to resources is the foundation of any...

Enterprise Architecture success in the Digital Era
Enterprisesecuritymag >> cxoinsights

Anthony Hill, Executive Director Business & Enterprise Architecture, Kaiser Permanente

Digital Drivers for EA The onset of the digital era in business is driving sweeping change and adaptation in organizations in all sectors. The next 10 years could be the most compressed and change-inducing in the history of business. The...

Why Security is More Pivotal than Ever in the Office of the Future
Enterprisesecuritymag >> cxoinsights

Hiro Imamura, Senior Vice President and General Manager, Business Imaging Solutions Group, Canon U.S.A.

When you think of security in an office setting, what comes to mind? Now picture that same office five years from now. Does the security landscape look the same? As the enterprises of today advance into the “Office of the Future,”...

How Information and Communication Technology is Enhancing Businesses?
Enterprisesecuritymag >>

Marcelo De Santis, Group Chief Information Officer, Pirelli

• Why is ICT Important for Pirelli? First, it’s important to understand our business strategy. Pirelli came back to the stock market in October 2017 as a pure consumer, high-value tire company specializing in the production of high...

Spring into Action! Growing Enterprise Architecture for Business Seasons
Enterprisesecuritymag >>

Martha Tartal, EA, United States Patent and Trademark Office

“Spring is the time of plans and projects.” Leo Tolstoy The sight of cherry blossoms may signify more than an end to cold weather. Depending on your organization’s budget cycle, the season of IT planning may also be in bloom....

U.S. Businesses and the General Data Protection Regulation
Enterprisesecuritymag >>

Greg Sparrow, SVP/GM, CompliancePoint

The General Data Protection Regulation (GDPR) is a European Union based regulation that requires businesses to protect the personal data and the privacy of any European Union (EU) natural persons when transactions occur within EU states. Data...

Facing the drift t-climb security & fraud's Everest
Enterprisesecuritymag >>

Thierry Derungs, Chief Digital Officer, BNP Paribas Wealth Management

I remember… my first computer. In 1986, with my girlfriend (now my wife), we bought an incredibly expensive top personal computer with an extraordinary hard drive of 20Mb and the best modem to connect to Internet at… 14,4kbit/s....

The State of Enterprise Security Budgets
Enterprisesecuritymag >>

Data security is one of the biggest concerns of the 21st century as every market decision is driven by analyzing the structured and unstructured data pattern. According to the recent IANS survey, only 22 percent of the companies with annual...

The State of Enterprise Security Budgets
Enterprisesecuritymag >>

Data security is one of the biggest concerns of the 21st century as every market decision is driven by analyzing the structured and unstructured data pattern. According to the recent IANS survey, only 22 percent of the companies with annual...