Posts tagged for “Data protection”

The Value of the Invisible
Cloud Computing

Enterprises require virtualization and automation to reduce operational costs. Unisys Secure Private Cloud provides the framework to make this happen.

Posted by: on October 31st, 2011


Jailbreaking iPhones – Freedom or Folly?
Security

"There’s an app for that." How did we cope before we had that for an answer to so many of life’s questions downloadable into a cool gadget that fits in the palm of our hand?

Posted by: on October 27th, 2011


How Are Asia Pacific Enterprises Responding To The Consumerization Of IT?
Security

The top 10 observations about Enterprise Mobility from Consumerization of IT research briefings.

Posted by: on October 26th, 2011


Consumerization of IT: Moving Beyond Security Concerns for IT Organizations, Part III
Security

Part 3 of this discussion focuses on understanding security requirements and innovating on what's possible.

Posted by: on October 20th, 2011


Beyond the Hype of Consumerization of IT, Part II: The Device and Its Role
Security

Approaches to achieve great success in device management at a relatively low cost to the enterprise.

Posted by: on October 5th, 2011


Beyond the Hype of Consumerization of IT, Part I: The Data
Security

"There’s an app for that." How did we cope before we had that for an answer to so many of life’s questions downloadable into a cool gadget that fits in the palm of our hand?

Posted by: on October 4th, 2011


Preventing Data Leaks Before They Occur, Part III
Security

The Very IT Architecture We Stand on is Shaken. Gone is the Perimeter. Data is Seeping into the Wild Wild West (e.g. world wide web)

Posted by: on September 29th, 2011


Preventing Data Leaks Before They Occur, Part II
Security

How do we get employees to not become our biggest threat?

Posted by: on September 28th, 2011


Preventing Data Leaks Before They Occur, Part I
Security

How do we get employees to not become our biggest threat?

Posted by: on September 27th, 2011


The Seismic Security Shift of 2011
Security

Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.

Posted by: on March 1st, 2011


We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.