Articles about Enterprise

New solution helps enterprises manage growing numbers of IP devices

network

In the past managing IP addresses has been relatively easy, but with the rapid growth in connected devices, and lots more addresses becoming available under IPv6, it's set to become a whole lot more complex.

Traffic management company NS1 is launching a solution to the problem with its Enterprise DDI (combining DNS, Dynamic Host Configuration Protocol (DHCP) and IP address management).

Continue reading

A traditional approach to security harms digital transformation efforts

cell keys

Half of security professionals who adopt a more traditional or reactive approach to their data protection and security don't believe they will reach their digital transformation goals in the next five years.

This is among the findings of a report from data protection company TITUS which conversely finds that nine out of 10 security professionals deploying a strategic approach believe their current efforts will address digital transformation needs within five years and that their organization would achieve its digital transformation goals in the same timescale.

Continue reading

Enterprises struggle with providing secure hybrid access

Secure cloud

As businesses move towards hybrid IT environments they increasingly face threats, gaps and investment challenges to keep their systems secure.

The study from secure access specialist Pulse Secure surveyed enterprises with 1000+ employees in the US, UK, Germany, Austria and Switzerland and finds that while they are taking advantage of cloud computing, all enterprises have on-going data center dependencies.

Continue reading

Most enterprises now run containers in production

cloud containers

New research from storage and data management company Portworx shows 87 percent of IT professionals are now running container technologies, with 90 percent of those running in production.

In addition seven out of 10 are running at least 40 percent of their application portfolio in containers -- an increase from two years ago, when just 67 percent of teams were running container technologies in production.

Continue reading

New self-service platform helps developers apply AI at the edge

Artificial intelligence

In the past AI has mostly depended on expensive solutions running in the cloud, restricting its use to a relatively small number of companies.

But with the growth of the IoT and ever greater volumes of information that need to be processed fast, there's more demand for AI at the edge. Xnor is launching a new self-service platform called AI2GO, that enables developers, device creators and companies to build smart, edge-based solutions without needing training or background in AI.

Continue reading

Half of companies missed GDPR compliance deadline

GDPR touchscreen

Only half of companies achieved compliance with GDPR before the May 25, 2018 deadline, and most companies took seven months or longer to achieve readiness.

This is among the findings of a new report from privacy management platform DataGrail which also reveals that two-thirds of companies assigned dozens, or even hundreds, of employees to manage GDPR compliance.

Continue reading

New tool helps protect sensitive data on Oracle databases

personal data

With GDPR in effect and privacy regulations being planned in other parts of the world, many organizations are looking at their database management to ensure stored data is complaint and doesn’t threaten the business.

For Oracle users, Quest Software is launching its Toad for Oracle -- Sensitive Data Protection (SDP) Module. This allows database admins to to detect and receive notification of personally identifiable information (PII) data residing in databases, select encryption and redaction options immediately after detection, and perform ongoing monitoring

Continue reading

Providing guardrails for developers to innovate while staying secure in the cloud

resistance to cloud

Enterprise cloud adoption has largely been driven by developers eager to take advantage of its agility. These developers are often moving very quickly and are under pressure to bring new products to market that provide competitive advantages. The speed of development combined with a lack of cloud security expertise often results in engineers and developers bypassing certain security and compliance policies. The result is a chaotic, "Wild, Wild West" cloud environment.

Alongside innovative apps and services, a common byproduct of this "free for all" mentality is data breaches, thanks to misconfigurations and other security glitches. This article shares advice on how organizations can empower their developers and engineers by providing a safe framework within which to operate, so they can stay agile and innovative, without inadvertently compromising security.

Continue reading

59% of adults experience stress in the workplace -- could business technology provide a means to help reduce this figure?

workplace stress

The combination of technology and mental health can often have negative connotations. There is plenty of media attention surrounding the negative impact the former can have on the latter. In fact, there is research identifying that social media and too much screen time can increase the risk of depression and anxiety, which can lead to hampered sleep and increased stress levels. A recipe for disaster?

Looking at the other side of the coin, technology can also work to improve mental health and stress levels. In recent years, technology has brought about hugely beneficial health apps like Headspace, Calm and Stop, Breathe & Think. This has provided people with a way to help manage their own mental health conditions on a daily basis, such as anxiety and depression. Businesses can also employ different technologies to help address workplace stress. Together, let’s take a deeper look at that below…

Continue reading

How open source is helping remove data silos in the enterprise [Q&A]

folder stack

Historically data has been stored in silos in order to deliver a quick solution. But in the longer term silos can slow down decision making, make modifying systems harder, and hinder compliance with regulations.

One of the ways to break down barriers between silos is to allow data to be freely shared between them and open source has a big part to play in this. We spoke to Mandy Chessell, distinguished engineer at IBM Cognitive Applications, and recently elected leader of the Technical Steering Committee of the ODPi, to learn more.

Continue reading

46 percent of organizations consider taking personal data out of the cloud

Secure cloud

A new study finds that 46 percent of organizations which store customer personally identifiable information (PII) in the cloud are considering moving it back on premises due to data security concerns.

The research from information security software company Netwrix also shows that of the 50 percent of organizations that store customer data in the cloud, 39 percent had security incidents in the past year and more than 50 percent of those couldn’t diagnose the problem.

Continue reading

AI-driven platform brings automation to field service organizations

technician laptop

As technology becomes increasingly complex and more devices are connected to the IoT, so the volume and complexity of field service requests increases too.

To help deal with this, automation company Zinier is launching its new Intelligent Service Automation and Control (ISAC) platform, an AI-driven solution enabling field service organizations to operate more efficiently.

Continue reading

Is latency the cloud's Achilles heel? [Q&A]

Cloud maze complexity

The cloud is arguably the most transformative enterprise technology in the past two decades. Yet, as powerful as it is, it faces a huge latency problem -- and the big public cloud providers know it.

Their data centers can't be everywhere and close to every end-user, so the big distances created result in unavoidable latency.

Continue reading

Protecting card data and more in the contact center [Q&A]

call center

Although many transactions are now carried out online, contact centers remain an important tool for businesses.

Call and contact center payment security solutions provider Semafone has had its latest Cardprotect (version 4) product validated by the Payment Card Industry Security Standards Council (PCI SSC) against the latest version of the Payment Application Data Security Standard (PA-DSS). This makes it one of the only companies in the industry to provide this level of certification.

Continue reading

Companies continue to struggle with privileged access management

Admin login

Privileged accounts can be a headache for organizations so you'd expect managing them to be a high priority for security teams. However, a new report from Thycotic reveals that 85 percent fail to achieve even basic privileged security hygiene.

In addition 55 percent have no idea how many privileged accounts they have or where they’re located, while over 50 percent of their privileged accounts never expire or get deprovisioned.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.