TITLE

THREE IT PROJECTS THAT MATTER

AUTHOR(S)
Gittlen, Sandra
PUB. DATE
December 2007
SOURCE
Network World;12/24/2007, Vol. 24 Issue 50, p31
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article discusses the three most significant Information Technology (IT) projects in the U.S. The three most important projects that enable better data protection are privacy, enterprise rights management and data center automation. The privacy project protects organizations from regulatory fallout and data leakage. On the other hand, enterprise rights management (ERM), provides intellectual assets security. According to Bill Leo, CIO at management consultancy Oliver Wyman Delta Organization & Leadership in New York, ERM will ensure the intellectual capital doesn't fall into the wrong hands to be used in a competitive way. Meanwhile, data center automation provides automated tools to secure data from leakage and hacking.
ACCESSION #
28132028

 

Related Articles

  • NW500 survey: Important advances. Dix, John // Network World;6/20/2005, Vol. 22 Issue 24, p38 

    This article presents the findings of the annual survey, "Network World 500," regarding technological advances in the computer industry for 2005. Bolstering security, striving to comply with regulations, and updating data center infrastructure are the activities that will preoccupy information...

  • Start-up shields against Exchange failures. Connor, Denil // Network World;1/31/2005, Vol. 22 Issue 4, p14 

    This article features Mimosa Systems' (MS) continuous data protection software that specifically supports Microsoft Exchange systems. The company says its NearPoint software enables speedy recovery of Exchange data and archives messages for compliance purposes. MS is developing software that...

  • Sybase readies revamped database. Cowley, Stacy // Network World;9/12/2005, Vol. 22 Issue 36, p34 

    This article reports that Sybase Inc. is preparing to release a major new version of its database software, Adaptive Server Enterprise (ASE) 15. The update offers customers greater security and scalability features with significant advances in areas such as encryption and manageability. One key...

  • Virtualizing network security. Freeze, Jim // Network World;8/25/2008, Vol. 25 Issue 33, p27 

    The article focuses on the impact of virtualization of data center resources on the security of computer networks. It mentions that enterprise network managers in the computer software industry are looking to virtualize data libraries without compromising its security. It cites that superior...

  • A booster shot for anti-virus. Garcia, Andrew // eWeek;5/28/2007, Vol. 24 Issue 19, p35 

    The article focuses on the complacent attitude of several computer companies concerning their anti-virus offerings in the U.S. It highlights several information technology (IT) firms which have no significant improvement on its existing anti-malware technologies. As an example, the author cites...

  • Software tackles spyware, virus threats. Messmer, Ellen // Network World;3/28/2005, Vol. 22 Issue 12, p18 

    This article reports that GreenBorder Technologies debuted a software aimed at preventing spyware and virus contamination from the Internet for users of Microsoft Corp.'s Internet Explorer browser and Outlook electronic-mail. The company's first product is GreenBorder Professional Edition,...

  • 10 ways to STOP spyware. Gaskin, James // Network World;3/28/2005, Vol. 22 Issue 12, special section p16 

    This article provides ways to stop spyware such as the following: 1) distinction among spyware, adware, hijackers, and cookies; 2) decision to shift to Firefox or Opera Internet browser; 3) caution not to download anything in the Internet; 4) teaching of users on how to recover from download...

  • To protect and preserve. Baltazar, Henry // eWeek;4/24/2006, Vol. 23 Issue 17, p37 

    The article reports on how content-addressed storage (CAS) systems can help information technology managers bring their organizations into compliance with regulatory mandates. CAS is an intelligent repository used to store and preserve compliance-sensitive documents such as medical records,...

  • Check Point eases security update steps. Greene, Tim // Network World;9/12/2005, Vol. 22 Issue 36, p24 

    This article reports that by the end of 2005, Check Point Software Technologies Ltd. plans to release software and a service that will let customers more easily update its security platforms. Called Universal Updatability, the software will apply to all of the company's platforms, that include...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics