Many companies are looking for IT solutions that will help them achieve compliance in the areas of auditing, policies, procedures, authentication and authorization.


NewsChina is aiming to purge most foreign technology from banks, the military, state-owned enterprises and key government agencies by 2020, stepping up efforts to shift to Chinese suppliers, according to people familiar with the effort.
NewsInformation security professionals in general want a single, comprehensive endpoint security system, but endpoint security deployment typically is tactical and driven more by firefighting than strategy, according to a new report from research firm Enterprise Strategy Group (ESG).
NewsTarget Corp. is asking a federal judge to throw out claims by banks that had to deal with the consequences of a data breach that compromised at least 40 million credit-card accounts.
NewsA new report from the Institute of Medicine advocates incorporating standardized social and behavioral data into electronic health records.
RegulationsWhen initiating an EIM program focused on unique device identification compliance, a good place to begin is with an understanding of your company’s organizational and infrastructure readiness.
BlogSaugatuck identifies three key areas which will influence enterprise IT directions and shape the IT market in 2014
Twitter
Facebook
LinkedIn
Please note you must now log in with your email address and password.