"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

chief information officer

Results 1 - 20 of 20Sort Results By: Published Date | Title | Company Name
Published By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
CA Technologies
Published By: CA Technologies     Published Date: Aug 22, 2017
Enterprise security traditionally relied on a fortress strategy that locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : 
    
CA Technologies
Published By: Macquarie Telecom     Published Date: Jan 11, 2011
How hosted data center services eliminate the daily pain and frustration of managing your IT infrastructure.
Tags : 
macquarie telecom, hosted data center services, it infrastructure, chief information officer, cio, oursourcing, productivity, infrastructure
    
Macquarie Telecom
Published By: Google     Published Date: Aug 09, 2017
This report looks at the biggest changes in firms’ expectations of their chief information security officers (CiSOs) and provides specific examples of how top information security professionals rise to those occasions.
Tags : 
security, ciso, chief information security officers, performance, customer experience, customer engagement
    
Google
Published By: Siemens     Published Date: Jun 06, 2014
This interview features answers to common questions about HIE technology by Tom Pacek, the health system’s Vice President and Chief Information Officer, and Ed Rodriguez, Director of Ambulatory Informatics.
Tags : 
siemens, hie, clinical workflows, care coordination, reduce costs, streamline communication, healthcare
    
Siemens
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Atrius Health Chief Information Security Officer Chris Diguette oversees security for Atrius Health, the largest physician-led healthcare provider in the northeastern US. The organization is recognized nationally for its use of health information technology. Diguette is also CIO of the VNA Care Network, a home healthcare provider and subsidiary of Atrius Health. As CISO, Diguette and his team work to implement and maintain a security infrastructure that safeguards the organization’s critical health information systems and applications, such as its Epic Systems Electronic Medical Records (EMR) system and the personal data of more than 675,000 patients at 29 facilities in eastern and central Massachusetts.
Tags : 
artius, health, chief, information, security, officer, organization
    
McAfee EMEA
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read how chief information security officers (CISOs) view the state of mobile computing. This whitepaper discusses the importance of mobile enablement, policy updates, pertinent security practices and what organizations have done to secure their business mobility.
Tags : 
ciso, mobile, computing, security, idg, symantec, managers, enterprise
    
CDW Symantec
Published By: IBM     Published Date: Oct 29, 2009
Learn more about the role of today's midmarket CIO and what they are doing to achieve three primary goals -- make innovation real, raise the ROI of IT and expand business impact.
Tags : 
ibm, cio, mmdg, midmarket, chief information officer, innovation, roi, business management
    
IBM
Published By: LogRhythm     Published Date: Apr 04, 2017
The value of peer input cannot be overstated. Authored by leading Chief Information Security Officers, CISOs Investigate is an ongoing series that offers first-hand insights to security leaders as they make business-driven technology decisions.
Tags : 
    
LogRhythm
Published By: SAP     Published Date: Aug 24, 2010
Communicate to line-of-business managers how they can deliver the right information at the right time to support better, faster decisions, and thus ensure long-term company success.
Tags : 
sap sme, it managers, chief information officer, cio, project management, business operation, service-oriented architecture, soa
    
SAP
Published By: SAS     Published Date: Sep 13, 2013
If businesses are recognizing the need for a dial-tone approach to establishing “data utility” services for meeting user expectations for data accessibility, availability and quality, it is incumbent upon the information management practitioners to ensure that the organization is properly prepared, from both a policy/process level and a technology level.
Tags : 
sas, cio, chief information officer, data utility, information management, software development
    
SAS
Published By: Symantec     Published Date: Jul 11, 2017
The technology pendulum is always swinging. And chief information security officers must be prepared to swing with it—or get clocked. A look at recent history illustrates the oscillating nature of technology. In the 1980s, IBM mainframes dominated the landscape. In the ’90s, client-server computing came on the scene and data was distributed on personal computers. When the Web assumed predominance, the pendulum started to swing back to a centralized server. Then, just as quickly, mobile took the lead, with apps downloaded to workers’ devices—the new client server. Now, as mobile devices continue to populate the enterprise at a rapid rate, the IT model is changing again—to the provisioning of information on a just-what’s-needed, just-in-time basis from centralized servers consolidated in the cloud. The pendulum continues to swing and IT workloads are moving to the cloud en masse.
Tags : 
cloud, security, data protection, data loss, information security
    
Symantec
Published By: IBM     Published Date: Apr 09, 2015
IBM Security, in partnership with the Center for Applied Insights, has launched the 2014 IBM CISO Assessment. Driven by the specter of external attacks and the needs of their own organizations, CISO's are continuing the shift toward a business leadership role that focuses on risk management and taking a more integrated and systemic approach.
Tags : 
ibm, risk management, security risk, security officer, data security, networking, security, it management
    
IBM
Published By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : 
ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
    
IBM
Published By: IBM     Published Date: Oct 13, 2017
Integrated Threat Management For Dummies, IBM Security Limited Edition, lays the foundation for effective tools and techniques that work together to help counter today’s advanced threats. Regardless of your role in the IT security organization, threat management tools and techniques will influence your job. Your role determines the part you play to effectively manage threats, including those targeting the cloud and your company’s data. If you are a Chief Information Security Officer (CISO) or security manager, this book explains in detail the types of tools you need to effectively prevent, detect, and respond to security incidents. If you’re in general business management, you’ll better understand the risks associated with enterprise computing and the reasons why a comprehensive portfolio of security tools that work well together is so important.
Tags : 
malware prevention, network intrusion prevention, malware protection, ibm, firewall, mutating malware, cyber threats
    
IBM
Published By: SilverSky     Published Date: Apr 16, 2013
A SilverSky study of 200 U.S. chief information officers and senior level security decision-makers were found that nearly all (97 percent) of respondents indicate their confidence level in the cloud has either increased or stayed the same in the past 12 months. The Silver Lining report provides insights into cloud behavior. Download the report now and see how your peers are feeling about moving to the cloud.
Tags : 
study, cloud, adoption, cloud security, cio, it security, virtualization, security
    
SilverSky
Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for leading meaningful security discussions with the board of directors.
Tags : 
citrix, security, data, security management, security policies, best practices, collaboration
    
Citrix Systems, Inc.
Published By: Citrix     Published Date: Jul 25, 2014
In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share security best practices for IT leaders.
Tags : 
network security, application security, best practices, software compliance
    
Citrix
Published By: OneNeck IT Services     Published Date: Aug 24, 2007
When he joined SDBC in May of 2004, SunnyD's Chief Information Officer and Global Controller was faced with a classic build-or-buy decision, although the circumstances were less than typical. Despite the company just being carved out from Procter & Gamble with an experienced management team and a well-known brand name, it was missing a crucial operational element — an entire information technology infrastructure.
Tags : 
oneneck, erp hosting, erp outsourcing, it outsourcing, it hosting, microsoft dynamics ax, fusion, outsourcing
    
OneNeck IT Services
Published By: IBM Corporation     Published Date: Jun 01, 2011
Gartner has identified five key failures in crucial interactions between security and risk professionals and their client.
Tags : 
ibm, gartner, communication, security message, enterprise risk management, jeffrey wheatman, chief information security officer, ciso
    
IBM Corporation
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory