ITO America Business Technology Magazine
 
              
About ITO America
IT Optimization Solution Centers
CIO Resource Centers
BSM & ITILv3
BI
Customer Centric Enterprise and Customer Experience Management
Data Center Optimization
Data Center Security and Integrity
Enterprise Mobility
Green IT and Energy Efficient Data Centers
SaaS and Cloud Computing
Service Oriented Architecture and BPM
Unified Business Communications
Virtualization and Data Center Automation
WAN Application Delivery
CIO Thought Leadership and Contributions
 Podcasts
Videos
Webinars
Business Technology Analyst Partners and Media Partners
ITO America Testimonials and Previous Clients
ITO America Media Kit
ITO America Information Technology Optimization News
Contact ITO America staff
ITO America IT Industry Events
Data Security & Integrity Sponsored By:
CIO Executive Panels - Data Security & Integrity Discussions
Renee Guttmann
Renee Guttmann


VP, Information Security and Privacy Officer, Time Warner
Mark Clancy
Mark Clancy


EVP IT Risk Technology, Citigroup
Jon Ramsey
Jon Ramsey


CTO, SecureWorks
Trent Henry
Trent Henry


VP & Research Director, Burton Group
Scott Crawford
Scott Crawford


Research Director, EMA
Jon Oltsik
Jon Oltsik


Principal Analyst, ESG
Security remains a top concern for CIOs, CTOs, CSOs and other C-level executives, for good reason. The proliferation of wireless devices, e-enabled applications and advanced global systems puts your data in the hands of more people in more places than ever. Mistakes are costly and adversely impact brand reputation and customer trust. Enterprises need to keep their infrastructures up and running 24x7. They need to be able to access information anytime and anywhere. That means that their critical systems must be up and running all the time. Therefore, it is important that they protect the physical systems, the operating environments, and the applications, across all tiers of their infrastructure. They must protect a broad range of information types, from email to business documents to digital photos to audio and video files. Also, they must ensure that the interactions, the connections, the collaborative environments and the movement of data while in use, are protected.

Best Practices for Implementing E-Signatures Best Practices for Implementing E-Signatures
It is important to make sure your electronic signature platform meets the highest security standards. Security is at the core of a trusted digital experience between you, your employees and customers. Download this 6-page white paper to learn the best practice recommendations to ensure your electronic records are secure and reliable.
Recognizing Five Sources of High-Profile Data Security Breaches Recognizing Five Sources of High-Profile Data Security Breaches
This white paper discusses the 5 major categories of vulnerabilities that IT and security professionals need to account for in their solutions planning.
Forrester - Total Economic Impact Of Trend Micro Enterprise Security Forrester - Total Economic Impact Of Trend Micro Enterprise Security
This study illustrates the financial impact of an organization migrating to Trend Micro Enterprise Security and the benefits received from deploying a cloud-client solution for Web, messaging, and endpoint security.

 


Interview with Founder of CloudChronicle.com Interview with Founder of CloudChronicle.com
In this interview with Patrick Pushor, CTO and Founder of CloudChronicle.com, Patrick discusses the models of consumption that lend themselves well to cloud computing, covers the challenges regulated industries face when launching cloud projects, touches on the public versus private cloud debate, and names some of the non-technical barriers to cloud adoption.
Addressing Cloud Computing Security Challenges Addressing Cloud Computing Security Challenges
Dave Asprey, VP of Cloud Computing at Trend Micro, discusses the unique security challenges that accompany private and public cloud computing. He also offers advice on how companies can begin to evaluate their current cloud computing security efforts and discusses which technology solutions he believes will make an impact on cloud security in 2011.
Security in a New Era of Threats Security in a New Era of Threats
In this podcast, Jon Ramsey, CTO at SecureWorks, addresses an array of security issues currently facing businesses, including security in the cloud, insider attacks, securing mobile devices and how to manage spam and malware. The story of a CEO whose gmail account was hacked eventually leading to the loss of $1 million will shock you.

Software Security Assurance Strategies in the Age of Cloud Computing and Increased IT Threats Software Security Assurance Strategies in the Age of Cloud Computing and Increased IT Threats
In this Thought Leadership Interview, conducted at the 2011 CIO Cloud Summit, Roger Thorton, Founder & CTO of Fortify, An HP Company, discusses why companies' data security strategies are falling short and the advantages of proactive (as opposed to reactive) security. Thorton also provides an overview of cloud computing security issues, and defines and explains the advantages of software security assurance.

Get the Balance Right: A Guide to E-mail Governance Get the Balance Right: A Guide to E-mail Governance
According to Enterprise Strategy Group research: e-mail, when compared to other business applications, will have the greatest impact on server and storage spending over the next two years and eighty percent of electronic discovery events involves e-mail and associated attachments. Gregory P. Kosinski, Director, EMC and Brian Babineau, Senior Analyst, ESG discuss common e-mail management practices and their drawbacks as well offer opportunities and suggestions for improvement.

The Timeline of a Spear-Phishing Attack on Your Organization The Timeline of a Spear-Phishing Attack on Your Organization
In The Spear-Phishing Attack Timeline, you'll get an inside look at the anatomy of a spear-phishing attack. Step by step and day by day, you'll see where the mistakes get made and how vulnerabilities get exploited - all leading up to that day when the CEO must make the rounds of national news media to admit that customer data has been compromised.
Balancing Security, Compliance and Cost: the Prescription for Healthcare Email Management: Move to the Cloud Balancing Security, Compliance and Cost: the Prescription for Healthcare Email Management: Move to the Cloud
Learn how cloud-based technologies for core productivity tools such as email and collaboration can help healthcare organizations be more efficient with IT dollars and focus on strategic initiatives such as the EMR.
Email Archives: No Longer Fit for Purpose? Email Archives: No Longer Fit for Purpose?
This paper examines the difficulties and pain points that organizations encounter as they seek to straddle the conflicting pressures of ever increasing email volumes on one hand, and the need for faster, more flexible accessibility on the other. It also explores what practices and policies are currently in use when it comes to archiving emails, and the ways in which businesses can improve practices in this crucial area.
Storage Anywhere and Everywhere: Dealing with the Challenges of Data Fragmentation Storage Anywhere and Everywhere: Dealing with the Challenges of Data Fragmentation
The shape of the IT landscape has been evolving over the years and continues to do so. Gone are the days when one or two central systems could meet all of the organization's IT needs. We now have more departmental applications, collaboration and sharing environments, and even cloud-based services in the mix, with access via desktops, laptops, tablets and smartphones that can each store data in their own right. Against this background, are we in danger of losing control of our business information?
The Client Mandate on Security The Client Mandate on Security
Like most other organizations, law firms face new challenges every day when protecting their confidential information. Unlike many other organizations, however, law firms must also protect their client's confidential information. They have long been required to secure private information due to legal and regulatory requirements. Email is a key area of a firm's IT infrastructure when it comes to vigilance for security and governance.
Developing an Information Strategy Developing an Information Strategy
Five vital actions are essential steps in a well-executed information strategy: strategize, align, govern, execute, and optimize. When working in harmony, these actions improve processes, increase productivity, and enhance decision-making. This white paper explores how to use them to develop an effective and broad-reaching information strategy.
Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing Capturing the New Frontier: How Software Security Unlocks the Power of Cloud Computing
This paper describes the concepts of cloud computing and software security within the cloud and what they mean to organizations interested in moving to the cloud (consumers), and to the providers of cloud services.
Securing Your Applications: Three Ways to Play Securing Your Applications: Three Ways to Play
Aberdeen's research confirms that the total annual cost of application security initiatives is far outweighed by the benefits of fewer actual security-related incidents, fewer audit deficiencies, and faster time to remediate. But all respondents, from Best-in-Class to Laggards, experienced a positive return on their annual application security investments.
New PCI DSS 2.0 Focus on Virtualization (Thought-Leadership Editorial) New PCI DSS 2.0 Focus on Virtualization (Thought-Leadership Editorial)
This interview provides insight on PCI 2.0 and an overview of virtualization security best practices from Trend Micro - a member of the PCI Virtualization Special Interest Group, and the leading vendor of virtualization security solutions. Blake Sutherland, compliance expert and VP of Strategic Markets provides insight that will allow technology executives to confidently virtualize the PCI cardholder data environment and beyond.
Trend Micro's End-to-End Vulnerability Management: A New Approach to Layered Security Trend Micro's End-to-End Vulnerability Management: A New Approach to Layered Security
The growing capabilities of applications and content delivery technologies have created entirely new architectures that have had nothing short of a transformative impact on IT.