Data security & protection News
August 18, 2015
In this podcast, SearchHealthIT's HIT Squad discussed Cerner's DoD EHR contract and whether mHealth delivers ROI and health IT security.
August 05, 2015
Data science can sort through huge data stores in order to find and stop advanced attackers and malware, but new methods are needed to make sure the machine learning keeps up with evolving threats.
July 28, 2015
Savage IO's SavageStor is a software-agnostic brick of storage, servers and controllers that leaves storage management and data protection to open software.
July 08, 2015
Infosec professionals worry that mobile payment systems will increase the risk of data breaches, but experts argue their fears are overblown.
Data security & protection Get Started
Bring yourself up to speed with our introductory content
A recent study revealed more than 95% of SAP systems were exposed to potentially disastrous vulnerabilities. Expert Nick Lewis explains how to mitigate these SAP vulnerabilities and maintain ERP security. Continue Reading
Cloud inventory management saves money, reduces security risk and helps the enterprise compete. But first, CIOs must build relationships with business decision makers. Continue Reading
User behavior analytics is emerging as a technology to prevent malware infections and end-user attacks, but how viable is it? Expert Nick Lewis outlines the pros and cons. Continue Reading
Evaluate Data security & protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Ever since the dawn of the BYOD era, personal and business data have comingled. Enterprise security pros need to not only secure company-owned devices; they must also protect the business data that ends up, inevitably, on smartphones, tablets and laptops that the employees own and carry everywhere.
This technical guide considers in depth two recent security concerns: the security risks created by insecure implementation of cloud backups by mobile and the phenomena known as BYOD mobile app data slurping. Then, in our concluding chapter, we consider the best means to approaching mobile data protection today. We cover how to approach creating a mobile application security program that employees will accept and follow. We also consider when and how to employ a mobile app reputation service, in order to weed out which apps are likely malicious. Specific tools for mobile protection -- mobile device management and mobile application management tools -- are also discussed.
This technical guide provides a collection of information on the latest threats to mobile data as well as advice on how to ensure your enterprise has the best mobile app security possible. Continue Reading
The Violin 6000 Series is a family of all-flash arrays for enterprises running large virtual infrastructures, big data analytics and more. Continue Reading
Use this checklist to make fair and comprehensive comparisons between colocation data center providers. Continue Reading
Manage Data security & protection
Learn to apply best practices and optimize your operations.
Compliance initiatives are often prompted by legal or regulatory concerns, but a proactive approach is more likely to create return on investment. Continue Reading
News of government surveillance programs is appearing almost daily. Enterprises need to do what they can to protect corporate data from potential eavesdropping -- but how? Expert Kevin Beaver offers some best practices. Continue Reading
Disk-based backups present different security risks than backup tapes. Protection methods can vary widely depending upon storage architecture. Continue Reading
Problem Solve Data security & protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Employees love the ease of downloading apps. But IT needs to be vigilant in providing workers with what they want while maintaining security over SaaS products. Continue Reading
Data center managers take on the burden of protecting the business's data assets. Discover the best strategies to deploy firewalls, encryption and other tactics. Continue Reading
Successful implementations of mobile technology in healthcare organizations depend on strong IT management, from security hardware and best practices, to protect patient data. This edition of Pulse addresses the challenges healthcare IT professionals face when deploying mobile healthcare applications.
In the cover story, SearchHealthIT news writer Shaun Sutner takes a look at trends in healthcare mobile security, and how IT professionals deal with the specter of a data breach. "It's not a matter of if it's going to happen, but when," explains one CISO.
Also in this issue: SearchHealthIT news writer Kristen Lee checks in with IT professionals, who tell her "we are absolutely terrified" by the breadth of the threats facing healthcare organizations. Find out what steps they're taking to overcome that fear in this issue of Pulse. Continue Reading