was successfully added to your cart.
Category

Information Classification

image_pdfimage_print

The Four (4) Behind-the-Scenes Forces that Drive Many of Today’s Technology Infrastructure Buying Decisions

By | Continuous Data Protection, Data Center Management, Data Protection, Deduplication, Information Classification, Virtualization | No Comments

It is almost a given in today’s world that for almost any organization to operate at peak efficiency and achieve optimal results that it has to acquire and use multiple forms of technology as part of its business processes. However what is not always so clear is the forces that are at work both insider and outside of the business that drive its technology acquisitions. While by no means a complete list, here are four (4) forces that DCIG often sees at work behind the scenes that influence and drive many of today’s technology infrastructure buying decisions.

Read More

DCIG 2014-15 Security Information and Event Management (SIEM) Appliance Buyer’s Guide Now Available

By | Buyer's Guides, Governance Risk and Compliance, Information Classification, Information Governance, Litigation Readiness, Security, SIEM, Threat Assessment | No Comments

DCIG is pleased to announce the availability of its DCIG 2014-15 Security Information and Event Management (SIEM) Appliance Buyer’s Guide. In this Buyer’s Guide, DCIG weights, scores and ranks 29 SIEM appliances respectively from nine (9) different providers. Like all previous DCIG Buyer’s Guides, this Buyer’s Guide provides the critical information that all size organizations need when selecting a SIEM appliance to help provide visibility into their security posture by providing usable and actionable information.

Read More

2014 Mobile Data Management Buyer’s Guide Now Available

By | DCIG, Electronic Discovery, Encryption, Governance Risk and Compliance, Information Classification, Information Governance, Information Management, Key Management, Security, Threat Assessment | No Comments

DCIG is pleased to announce the release of its 2014 Mobile Data Management (MDM) Buyer’s Guide that weight, score and rank over 100 features. Like previous Buyer’s Guides, this Buyer’s Guide provides the critical information that organizations need when selecting Mobile Data Management software to help meet the security, compliance and Bring-Your-Own-Device (BYOD) challenges in an ever increasing mobile enterprises.

Read More

GroupLogic Cash Flow Positive Prior to Release of activEcho for File-Sync-and-Share

By | Application Delivery, Governance Risk and Compliance, Information Classification, Information Management, Security, Uncategorized | No Comments

Earlier this year, DCIG interviewed the executive team at GroupLogic. GroupLogic shared with us how they approach the market for “enterprise file sharing” or what DCIG has been calling File-Sync-and-Share. In addition, we had the privilege of talking to Chris Broderick, CEO of GroupLogic who covered some of the company’s history.

Read More

Information Governance 2012: Data Science, not Storage and Security, is Required to Manage Big Data

By | @NOSQL, DCIG, Electronic Discovery, Governance Risk and Compliance, Information Classification, Information Governance, Information Management, Security, SRM | No Comments

Information managers can expect data storage companies to drive significant campaigns around Big Data as we enter 2012. Storage is the least of anyone’s concerns, according to The Economist Intelligence Unit (EIU) report Big Data: Harnessing a game-changing asset. Information Governance in 2012 requires Data Science strategy and practitioners be added to all business teams.

Read More

Big Data, Metadata, and Information Governance; CMIS Enables Scale, Tagging and Predictive Analytics

By | @NOSQL, DCIG, Electronic Discovery, Governance Risk and Compliance, Information Classification, Information Governance, Information Management | 2 Comments

Consumerization of content consumption models exposes opportunities to incorporate business process metadata with Big Data. Consumerization includes proliferation of social networks, content syndication and mobile devices, such as Apple iPAD, Samsung Tablet, etc. Consumerization of content merging with Enterprise Business Big Data is a challenge best met by standardized content interfaces.

Read More

Don’t hit the button: Hoarders love deduplication and compression.

By | Data Management, DCIG, Deduplication, Electronic Discovery, Governance Risk and Compliance, Information Classification, Information Governance, Information Management, Litigation Readiness, Storage Systems, Tiered Data Systems | No Comments

Over the years big data has crept into the everyday life of systems administrators. Attempts to solve the big data problem in both block and file storage emerged as data management software. While data management software struggled to get a footing, deduplication and compression took off stunting data management software’s growth.
Deduplication and compression technologies have well known capabilities in both the storage and information disciplines. However, they differ in a significant way. These technologies do not ease the burden of information management.

Read More

The Four Trends Driving the Move Towards an Information Centric World

By | Archiving, DCIG, Information Classification, Information Management, Storage Management, Virtualization | No Comments

Upon arriving at Symantec Vision on Wednesday morning, it quickly became evident that the messaging at this year’s event focused on how the business world is shifting from a Systems-Centric View (policies and governance is done according to the physical devices on which they reside such as servers, networking and storage) of data management to an Information Centric View (policies and governance are set independent of what storage device on which the data resides).

Read More

The Coming New World of Healthcare Data Management Demands Healthcare Savvy Data Management Providers

By | Data Management, DCIG, Governance Risk and Compliance, Information Classification, Information Governance, Information Management | No Comments

Obama’s administration allocated $17B of the recent (Feb 09) stimulus spending package to healthcare, for the purpose of building better healthcare infrastructure. The goal of the new infrastructure is to move patient records online and enable a ubiquitous Electronic Health Record (EHR) to be shared universally among hospital systems. Obama himself promised a total of $50B in spending for this purpose during his campaign. Some experts believe that even more is to come. But, now that some of the money is allocated, how are healthcare institutions getting access to it and what are they doing with it?

Read More