When wide spread surveillance by the NSA was revealed by Edward Snowden it started a storm of debate around privacy and the destruction of trust in the technologies supporting privacy on the Internet. The debate intensified when allegations surfaced that RSA had taken money in exchange for weakening the Dual EC DRBG encryption algorithm. All of this spilled over to the 2014 RSA Conference being held in San Francisco.
DCIG is pleased to announce the release of its 2014 Mobile Data Management (MDM) Buyer’s Guide that weight, score and rank over 100 features. Like previous Buyer’s Guides, this Buyer’s Guide provides the critical information that organizations need when selecting Mobile Data Management software to help meet the security, compliance and Bring-Your-Own-Device (BYOD) challenges in an ever increasing mobile enterprises.
One of the most pressing needs in many organizations today is the need to effectively manage their growing throng of mobile devices – be they iPads, iPhones, tablets or whatever new mobile device may be coming out next. In that vein, DCIG is preparing to release its inaugural DCIG 2014 Mobile Data Management (MDM) Buyer’s Guide in just a few weeks to help companies better understand what solutions are available to best manage these devices. In today’s blog entry, I share four (4) key items to consider when acquiring an MDM solution.
Security, security, security. The word rings loud and clear in the ears of corporate business owners when it comes to the data and information stored on mobile devices. Allowing employees to bring their own devices (BYOD) may increase productivity but an organization needs to make sure their sensitive information does not become public. In the fourth and final part of my interview with Amtel, Inc. CEO, Pankaj Gupta, we examine the growing trend in enterprises adopting BYOD and the scope of systems management being offered by organizations like Amtel.
Depending upon its size, a company looking to offer their employees the opportunity to bring their own device (BYOD) to work may be faced with choices, such as: How much data to allow on the device? How to manage the data accessed? Whose platform to use? Organizations like Amtel, Inc. have specialized in developing Mobile Data Management (MDM) for such companies. In this third installment of my interview series with Amtel’s CEO, Pankaj Gupta, we discuss hybrid vs. cloud and what it looks like for a company to use MDM for bring your own devices (BYODs).
In the arena of mobile data storage a business has a few options. In choosing which solution is best a company may ask itself, “Is keeping data on premises or putting it in the cloud more cost-effective?” and “Do we feel comfortable using the cloud for our storage needs?” During my first installment with Amtel, Inc. CEO, Pankaj Gupta, we chatted about how companies can adopt an open attitude in the corporate world of bring your own device (BYOD). Now, in my second segment with Amtel’s CEO, we discuss the benefits of storing data in the cloud, how secure cloud storage really is, and how accepting midmarket companies and larger enterprises are of putting their data in the cloud.
Anytime, anywhere, any device access to data is highly desirable for enhancing the productivity of an increasingly mobile workforce. But, if left to the end user, this enhanced access can create new headaches for IT and risks for the enterprise which has the responsibility to protect corporate data and comply with externally-imposed data management and eDiscovery requirements. To balance these user and business needs for access with enterprise needs to control data risks, CommVault now gives enterprises the tool they need to control this common problem as part of its most recent “Edge” Simpana release for laptops and desktops.
Not long ago, organizations did not even dream about the need to geo-fence within their business nor did they ponder the security risk involved in managing the company data on mobile devices. But times they are a changin’. Corporate America is seeing a massive shift in favor of users/employees bringing their own devices (BYOD) to work. Does this prove a benefit or a deficit for the company? In this first installment of my interview series with Pankaj Gupta, CEO of Amtel, Inc., we discuss the upside for a company allowing BYOD and how Amtel is set to support a company’s move toward this popular trend.
Security-in-depth is rarely discussed without including desktop antivirus with antivirus software being a cornerstone of corporate network protection since the advent of the computer virus. The danger that antivirus software presents is that within most organizations it presents the last line of defense so any threat capable of breaching this defense has the ability to wreak havoc within the enterprise.
The issue of attorney-client privilege remains one of the most revered privileges that the American judicial system bestows upon clients as it enables any person to communicate open and honestly with his/her attorney. Now this right is under scrutiny as keeping communications between a defendant and his/her attorney has become difficult to achieve due to the increased role that email plays as a form of primary communication medium between them.
IT’s role in the enterprise has changed dramatically in just the last few years – most notably in its responsibilities and workloads. No longer is it enough for IT to manage data protection recovery, networks, systems, and storage, but its responsibilities have expanded as it has merged with other operational and strategic business functions. This is forcing IT to develop a holistic understanding of the needs of the entire organization to ensure that the technology it deploys meets those needs as well as aligns with the larger company strategy.
Organizations across the United States have steadily felt the sting of legal action involving eDisocovery as they are quickly discovering that it is no easy feat to comply with mandates such as the Federal Rules of Civil Procedure (FRCP). This is resulting in mounting sanctions and a steadily decreasing patience in courts towards eDiscovery mistakes. However state and local government agencies were conspicuously absent from this steady stream of eDiscovery rulings.
No company regardless of its size is immune from the possibility of an eDiscovery. But even as companies look to respond to eDiscovery demands placed on them by rulings such as the Federal Rules of Civil Procedure (FRCP), an equally vexing problem that they face is making sense of their growing mountain of email data.
I recently had an interesting conversation with an IT Director who is currently working in health care. We were discussing how his job has evolved with the complexity associated with EMR (electronic medical record) systems and how IT in health care has been especially burdened. Beyond just playing technology catch up, there are numerous regulatory and litigation threats now hovering over it. He specifically pointed to litigation as one area that represents a growing risk to his company’s business and how responding to eDiscovery requests for electronic information has become a huge burden.
DCIG has consistently stressed the need for good eDiscovery processes for electronically stored information (ESI). A steady stream of sanctions surrounding poor eDiscovery strategies is a consistent reminder that a lack of planning can be damaging to your case. A recent case, Ferron v. EchoStar Satellite, LLC., in one such reminder that images and links in emails can be subject to eDiscovery and that the failure to preserve them could be costly.
When businesses think of Microsoft, it is not just Windows, Office or Internet Explorer that comes to mind. Increasingly it’s SharePoint that they identify as one of Microsoft’s most compelling solutions. Using a drive letter path for document collaboration is no longer practical in this day and age and SharePoint is now the tool to which many organizations turn to fill their collaboration needs. So while SharePoint fills this new need for many organizations, what is not so obvious to them is how to manage SharePoint so they can search, find and deliver relevant documents in a timely manner if faced with an eDiscovery request.
“As California goes, so goes the nation” is a phrase that I have heard before and it immediately came to mind when I read that Governor Schwarzenegger had signed California Assembly Bill 5, otherwise known as Chapter 5 – Electronic Discovery Act. Signed into law on June 29th, 2009, what makes this law significant is that it expands upon the verbiage used in the Federal Rules of Civil Procedure (FRCP). So for organizations already worrying about the FRCP, take heed because the Electronic Discovery Act takes eDiscovery to yet another level.
When the wheels came off the American economy in the fall of 2008 there was a steady stream of companies lining up for a government bailout and none were of a higher profile than American Insurance Group (AIG). Over a chorus of jeers from the general public the United States Government set out to rescue the “Too Big to Fail” company by setting up an $85 Billion dollar reserve in exchange for 79% ownership of the company. Emotions ran high during this time period and no matter which side of the aisle you were on in regards to the bailout of AIG, the current SEC complaint against AIG will make most any person angry.
The current recession’s wrath has spared few, and technology has seen its hard times just like all industry sectors, but one area that appears poised to be one of technology’s biggest benefactors is healthcare. When the Stimulus bill was passed, President Obama made it a point to bring healthcare technology front and center by providing $19 Billion dollars for the implementation of an electronic medical record (EMR). $19 Billion dollars certainly gets companies attention and most are either positioning themselves, or renewing their focus on healthcare to glean their share of this substantial investment of dollars.
One of the most significant areas of eDiscovery is performing a relevant keyword search of data to produce the proper documents as mandated by eDiscovery requests. This collection of ESI (electronically stored information) holds particular importance as produced documents will go through a review process prior to producing these to opposing counsel. As data continues to grow within organizations eDiscovery costs continue to rise therefore it is extremely important to have a robust search that reduces non-relevant information during a search.