Articles about Enterprise

The rise of the IoT and artificial intelligence in industry [Q&A]

Industrial IoT

While the consumer IoT has captured the imagination with smart appliances and devices, the industrial Internet of Things (IIoT) is a rapidly growing market. According to Accenture, the IIoT market could add $14.2 trillion to the global economy by 2030.

IIoT is also breathing new life into industries that are in great need of digital transformation, such as manufacturing, oil and gas, and more. As a result, artificial intelligence and machine learning are quickly becoming one of the biggest priorities for companies that want to make the most of their operational data to increase outputs using less energy and costs.

Continue reading

Most businesses struggle to get value from operational data

data overload

Organizations increasingly depend on data to drive improvements in all areas of the enterprise. But a new survey shows that data volumes are affecting productivity, with 68 percent of respondents saying their organization has so much data they struggle to make use of it all.

The study of 400 US and European business and IT professionals for Devo Technology, carried out by Vanson Bourne, shows that getting a unified view of information is challenging. 74 percent report their business is currently using different systems for real-time and historical data storage and analysis, and 95 percent say they face obstacles when trying to get a single view of data.

Continue reading

Manufacturing industry at greater risk of cyberattacks

Industrial internet of things

Manufacturing businesses are seeing higher-than-normal rates of cyberattack-related reconnaissance and lateral movement activity.

This is due to the convergence of IT with IoT devices and Industry 4.0 initiatives, according to a new report from AI-powered attack detection specialists Vectra.

Continue reading

92 percent of enterprises struggle to integrate security into DevOps

DevSecOps

A large majority of organizations are struggling to implement security into their DevOps processes, despite saying they want to do so, according to a new report.

The study commissioned by application security specialist Checkmarx looks at the biggest barriers to securing software today depending on where organizations sit on the DevOps maturity curve.

Continue reading

Carbon Black launches real-time security ops solution

endpoint protection

Security and operations teams often have no reliable way to assess the current state of endpoints across their enterprise.

Lack of visibility is a major concern which leads to greater risk of a breach and a lack of information to take appropriate action after a problem occurs.

Continue reading

Edge Computing 101

Edge computing

Enterprises today have adopted a cloud-first mentality, and the numbers show it. According to a 2018 Gartner survey, investment is public cloud services will reach $186.4 billion this year, representing 21.4 percent growth from 2017. But there’s growth that is just as exciting and strategic taking place far from the cloud, down at the network edge in the world of end user devices, Internet of Things (IoT) devices, and other network-connected systems.

Without strategic management of the network edge, investments in the cloud are going to run into trouble. To be a successful cloud-first enterprise, you need manage both the cloud and the edge equally well. Why is edge computing so important? Let’s take a look.

Continue reading

HP launches flexible systems to enhance in-store retail

HP Engage Go

Retailing presents some unique challenges for IT. Endpoints tend to be in fixed positions which has an effect on how staff interact with customers.

HP is unveiling a new portfolio of devices and service offerings designed to enhance the retail experience by freeing the technology to move around. The HP Engage portfolio provides sleek, versatile, and secure systems to meet the evolving needs of retail and hospitality customers.

Continue reading

Virtualization tool helps protect critical IP and high value assets

Virtualization

While breaches often focus on consumer or payment information, they also put at risk key intellectual property and business assets.

Virualization-based security specialist Bromium is announcing a new product called Protected App, which allows organizations to establish robust, end-to-end protection around their critical intellectual property (IP) and high value assets (HVAs).

Continue reading

Managed detection and response supports internal security teams

data threat

Companies are facing a constant battle against cyber threats, add to this a growing skills gap and security teams don't always have the staff or knowledge to effectively monitor and respond to threats.

Automated detection and response company Fidelis Cybersecurity is launching a new managed detection and response (MDR) service to supplement in-house security resources.

Continue reading

How automation can address the challenge of an aging workforce [Q&A]

older worker

A trend that's already started and will continue for at least the next decade is the loss of skilled workers as older employees start to retire.

The effects are being felt across industries, with Gartner reporting the aging workforce as one of the biggest challenges to the utilities industry. What's more, the skills gap resulting from retiring employees leaving and entry-level employees entering the workforce is causing all industries to look at new solutions to solve the need for experienced and highly skilled workers.

Continue reading

AlgoSec launches updated security management for cloud and hybrid

Secure cloud

As businesses shift their systems to the cloud there is inevitably an increase in complexity that makes maintaining security more of a challenge.

Security policy management specialist AlgoSec is launching a new version of its Security Management Solution to enable policy management across clouds and software-define networks.

Continue reading

Free template helps businesses deal with data breaches

Breach detection

Thanks to legislation like GDPR businesses need to report data breaches promptly or face large fines. However, in the heat of a security incident it can be easy to overlook vital procedures.

Privileged account management specialist Thycotic is aiming to help with the launch of a free Incident Response Policy Template to help businesses take the right steps at the right time.

Continue reading

Security remains top IT concern for SMBs

Data security watch face

Data breaches have serious consequences for SMBs and if not handled correctly can cause serious damage to the business.

It's perhaps no surprise then that according to a survey from IT infrastructure company Kaseya security remains the top IT priority for SMBs with 54 percent citing it as their main concern in 2018, up 14 percent from 2017.

Continue reading

Syncsort helps compliance for IBM i users

Compliance gauge

IBM's i operating system -- originally known as OS/400 -- is still popular in many larger and mid-sized organizations, and it is of course subject to the same security and compliance challenges as other systems.

Big data specialist Syncsort is launching additions to its Syncsort Assure family of products to help i users achieve compliance with GDPR and other legislation, and strengthen security with multi-factor authentication.

Continue reading

Endpoints leave industrial IoT vulnerable... Err, what's an endpoint?

Industrial IoT

Of over 200 respondents to a new survey, more than half report the most vulnerable aspects of their IIoT infrastructure as data, firmware, embedded systems, or general endpoints.

But at the same time the survey by information security training organization SANS Institute reveals an ongoing debate over what actually constitutes an endpoint.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.