DCIG is pleased to announce the availability of its DCIG 2014-15 Security Information and Event Management (SIEM) Appliance Buyer’s Guide. In this Buyer’s Guide, DCIG weights, scores and ranks 29 SIEM appliances respectively from nine (9) different providers. Like all previous DCIG Buyer’s Guides, this Buyer’s Guide provides the critical information that all size organizations need when selecting a SIEM appliance to help provide visibility into their security posture by providing usable and actionable information.
Data security is a part of the IT infrastructure that should take care of itself. Companies have enough to worry about without always looking over their shoulder to make sure no one is stealing vital information. As most organizations recognize, this is NOT the case.
One of the most exciting and terrifying times in the lifecycle of a company is transitioning from a small to mid-range or mid-range to enterprise sized company. Well led companies that survive those transitions have often been planning for the occasion for some time. The longer they have been planning the more likely they’ve become aware of the need for long term archiving. Of everything.
DCIG is pleased to announce the release of its 2014 Mobile Data Management (MDM) Buyer’s Guide that weight, score and rank over 100 features. Like previous Buyer’s Guides, this Buyer’s Guide provides the critical information that organizations need when selecting Mobile Data Management software to help meet the security, compliance and Bring-Your-Own-Device (BYOD) challenges in an ever increasing mobile enterprises.
One of the most common initial use cases for cloud storage is for the storage of archival data. However that does not mean every organization is quite ready to move all of their archival data to the cloud or, what they do move to the cloud, trust the cloud to be available to provide access to the data when they need it. In this fifth blog entry in my interview series with C2C Systems’ CTO Ken Hughes, he talks about the importance of having access to cloud storage repositories for archival data and the advantages of keeping on-premise and data in the cloud synchronized.
The accelerating increase in the volume of Electronically Stored Information (ESI) is resulting in knowledge workers reaching a point where they may not be able to utilize traditional data management and analytic technology and processes to keep pace. However, the increases in knowledge worker productivity and decreases in eDiscovery costs made possible by predictive analytic technology are coming to the point where they are applicable to other knowledge management tasks within the enterprise.
Faced with the accelerating increase in the volume of Electronically Stored Information (ESI) and the emergence of the concept of Big Data, enterprises worldwide need next generation IT systems to fulfill their corporate compliance, information governance and eDiscovery requirements to process and analyze all of this data. It is in response to this demand and the result of recent legal precendents that Technology Assisted Review (TAR), also known as Predictive Coding or Computer Assisted eDiscovery, is emerging as a legally viable and court-recognized option.
In this final installment of our interview series with GroupLogic we look at how mobilEcho enables organizations to wipe only company data off employees’ mobile devices, leaving the employee’s personal data untouched. We also hear how GroupLogic is helping telecommunications firms increase revenue by adding value to their customers’ telecommunications experience, and we gain insight into the DNA of the company as a software provider for over 20 years.
GroupLogic, a secure enterprise file sharing and syncing solutions provider, is all about responding quickly to customer demands for product features. On September 13th, Acronis announced it had acquired GroupLogic.
In our previous installment of this interview series, we examined how GroupLogic engages in “customer development” in lieu of product development to integrate customer-driven innovations into its products. In part 4, we take a look at GroupLogic’s strategic partnerships with other companies to create products that fulfill very specific needs for customers.
In part 2, we continue our discussion with GroupLogic’s Anders Lofgren, Vice President of Marketing and Product Management, by exploring licensing options and how the enterprise mobility space has opened up a new market for the company. As well, we dig deeper into activEcho and learn how it is designed to provide flexible and secure file-sync-and-sharing in the enterprise IT organization while being as simple and easy to use as one of the most popular–but unsecure–consumer grade file-sync-and-share cloud services today.
An integrated and centralized data store model that enables stakeholders from throughout an organization to harvest and analyze data on the same platform continues to be the goal of many organizations from the Global 2000 as they strive to address the requirements of Big Data. However, with today’s decentralized and cloud based storage systems and data storage requirements for the Global 2000 reaching the petabyte and even exabyte levels, massive centralized single data store infrastructures with single points of failure such as Apache Hadoop may not the most effective long term solution.
Earlier this year, DCIG interviewed the executive team at GroupLogic. GroupLogic shared with us how they approach the market for “enterprise file sharing” or what DCIG has been calling File-Sync-and-Share. In addition, we had the privilege of talking to Chris Broderick, CEO of GroupLogic who covered some of the company’s history.
The accelerating increase in the amount of unstructured Electronically Stored Information (ESI) is leaving IT organizations struggling with how to store and manage all of this new information. Aside from needing to provide the underlying storage infrastructure to host this amount of data, companies are also faced with the task of properly managing their Big Data file stores to meet both existing and emerging governance, risk and compliance (GRC) obligations. To do so, there are five initial steps they can take now to get their organization in front of these demands.
A convergence is happening in the cloud service provider space. More cloud-based archive and backup providers are evolving to account for transactional/production data while managed service providers want to extend their reach into the archival/backup space. One company at the forefront of this convergence is cloud service provider American Internet Services (AIS). Today I talk with AIS’s VP of Network Engineering, Steve Wallace, about how this convergence is impacting cloud service providers in general and AIS specifically.
Information managers can expect data storage companies to drive significant campaigns around Big Data as we enter 2012. Storage is the least of anyone’s concerns, according to The Economist Intelligence Unit (EIU) report Big Data: Harnessing a game-changing asset. Information Governance in 2012 requires Data Science strategy and practitioners be added to all business teams.
Consumerization of content consumption models exposes opportunities to incorporate business process metadata with Big Data. Consumerization includes proliferation of social networks, content syndication and mobile devices, such as Apple iPAD, Samsung Tablet, etc. Consumerization of content merging with Enterprise Business Big Data is a challenge best met by standardized content interfaces.
On average most mid-sized companies are not bothering with Information Management as a means to mitigate e-discovery costs. That is a conclusion reached by comparing Symantec’s 2011 Information Retention and eDiscovery Survey announced in October 2011 with the research completed by King and Spalding, LLP for the Duke Law Journal December 2010.
Over the years big data has crept into the everyday life of systems administrators. Attempts to solve the big data problem in both block and file storage emerged as data management software. While data management software struggled to get a footing, deduplication and compression took off stunting data management software’s growth.
Deduplication and compression technologies have well known capabilities in both the storage and information disciplines. However, they differ in a significant way. These technologies do not ease the burden of information management.
The situation confronting a VMware and Windows architect that I recently spoke with is probably one to which many system administrators can relate. On one hand, he had a requirement to make patches and updates to his company’s systems to keep them in compliance with PCI DSS regulations. On the other, making such changes could result in system downtime and disrupt his company’s operations (i.e. – stop its flow of income.) To resolve it, he turned to a new technology called the Thin Capture appliance from Kubisys.
When it comes to implementing any form of data reduction (compression or deduplication) on primary storage, many companies are still reticent to do so. So it was with some interest that I spoke to Mike Power, the CEO of Neuxpower, whose company is having success in not just delivering data reduction of files on primary storage but doing so leveraging lossy technology.