Gaining Data Control with BYOD and Bluebox

Gaining Data Control with BYOD and Bluebox

What’s the issue with BYOD? Data Control… What’s the issue with Data Sharing? Data Control! Let’s face it, though it took an evolution of about 15 years, industry figured out that Data Management and Control are the underlying security issues.  Data is power, knowledge, money, control.  If you have it you’re in control.  If you don’t, you’re not. If you lose it… you’re in trouble. There are many ways for data to exfiltrate in the BYOD/mobile device world.  It can be (un)intentionally released by employees, extracted by malware, stolen or leaked by malicious apps, you get the idea.  Firewalls aren’t stopping it ...

Read More

SAP Aims to Help Its Customers Engage Their Customers Engagingly

SAP Aims to Help Its Customers Engage Their Customers Engagingly

Despite the SMAC (social, mobile, analytics, cloud) trends being in plain sight for the past half decade, and SaaS Customer Relationship Management (CRM) apps being available for well over a decade, the business value proposition of SaaS CRM apps has only just recently made progress.  First generation SaaS CRM apps enabled small and medium businesses [...]

Read More

Cloud Rant:  Oracle Cloud versus SAP Cloud

Cloud Rant: Oracle Cloud versus SAP Cloud

For those that think that cloud is mainly about Amazon Web Services (AWS), Salesforce.com, Google, IBM, Microsoft Azure, Rackspace, and a list of smaller SaaS and PaaS vendors, think again.  After several years of investment, in the form of their own R&D, M&A, re-educating their channel, and changing internal systems to better support the cloud-style [...]

Read More

posted by Torsten Volk   | November 7, 2011 | 0 Comments

Future sign

Almost all of today’s business processes are supported and complemented by enterprise IT applications. These applications are often business-critical and therefore tied to strict Service Level Agreements (SLAs). Most enterprises utilize sophisticated monitoring tools to track system health on the application, operating system, hypervisor, hardware, network resources, and storage levels. These health monitoring tools send...

Read More »



posted by Shawn Rogers   | October 28, 2011 | 0 Comments

evolving data warehouse sm

When I got into this business it seemed most discussions about data management were centric to “how do we fit that information into the enterprise data warehouse?” Other options were considered a bad strategy or just plain too expensive to make sense. Over the past few years new data types, demands for deeper analysis, compliance...

Read More »



posted by Scott Crawford   | October 20, 2011 | 0 Comments

buried-help-flag-iStock_000009400696XSmall-150x150

Last week, I had the opportunity to spend a few days with a truly interesting and diverse group of practitioners, who I think are on to the future of information security. It will come as no surprise to anyone who follows this blog that I believe that future is centered on the ability to do...

Read More »



posted by Steve Brasen   | October 19, 2011 | 0 Comments

Dentrix-Mobile

Put this picture in your mind’s eye – It’s a beautiful sunny weekday and you’re sitting by a pool catching the sun’s rays and a cool breeze.  Strategically placed within arm’s reach beside you is some kind of fruity drink with a tiny bamboo umbrella in it.  You are working (yep, I said working!).  You...

Read More »



posted by John Myers   | October 19, 2011 | 0 Comments

oracle for blog

Yesterday, Oracle announced their intent to purchase Endeca, a vendor of unstructured data management and web commerce solutions. The purchase aligns well with Oracles recent announcements relating to unstructured data integration.  Specifically, the press release states: “combination of Oracle and Endeca is expected to create a comprehensive technology platform to process, store, manage, search and analyze structured...

Read More »



posted by    | October 18, 2011 | 0 Comments

iaitam-150x117

Spent last Tues-Fri in Las Vegas at the Aria, at the annual IAITAM (International Association of IT Asset Managers) conference. It was a good show. There was some buzz at the opening keynote about a major announcement, which turned out to be the establishing of a program for IT Asset Management via Taft University. (I...

Read More »



posted by    | October 18, 2011 | 0 Comments

tagvault

At the recent IAITAM conference, I spent some time with Steve Klos of Tagvault.org. Steve has been working on and advocating for software tagging standards, doing the long march through the ISO standards processes. He’s passionate on the topic of software asset management and how standardized software tagging is essential to improving the current state...

Read More »



posted by John Myers   | October 16, 2011 | 0 Comments

analytics-sm

Many times when discussing the topic of big-data, the focus is on the volume of the data, the structure of the data or the near real-time analysis requirements of the data.  We toss around buzzwords like Hadoop, structured vs unstructured, etc…. However, often times what is missed are the analysis goals of the big-data environment....

Read More »



posted by John Myers   | October 16, 2011 | 0 Comments
It is fantastic to part of the Enterprise Management Associates team and with that comes the opportunity to share insights and opinions via blog on the topics of: Business intelligence Data Warehousing Big Data Analytics Data integration In this world of “Crossfire” intellectual engagement (ie i yell louder therefore i win the argument),  I will offer my opinion(s)...

Read More »



data-explosion-iStock_000013253555XSmall

With the acquisitions of Q1Labs and NitroSecurity last week, the industry’s attention has been drawn anew to the value of security information and event management (SIEM). In the enterprise, SIEM is often the focus of security operations, collecting data from a variety of point products, management and monitoring systems. But as I wrote on Tuesday,...

Read More »



Page 19 of 32« First...10«1718192021»30...Last »