Why IT is the new defender of customer anonymization

Back in 2013, the term data breach was hardly used. Now, it feels like it is the new normal – and it has major ramifications for your business from the IT department to the boardroom to your public-facing brand. With consumers increasingly wanting personalised customer experiences, what do you need to know to ensure you tread the fine line between a great customer journey and keeping data truly private?

This whitepaper from Jahia and Enterprise AppsTech looks at the ramifications for your...

By James Bourne, 27 June 2016, 0 comments. Categories: Data & Analytics, Privacy.

The key to unlocking Identity 3.0 – and avoiding the hell of “crap” passwords

(c)iStock.com/AnthiaCumming

Identity is almost irretrievably broken – and those who are trying to fix it are going entirely the wrong way about it.

That was the underlying theme from an entertaining talk by Paul Simmonds, CEO of the not-for-profit Global Identity Foundation at Cloud and DevOps World, which puts a focus on finding a global identity solution which is privacy enhancing and globally scalable.

Pulling no punches in the early stages – describing passwords as “really crap”...

By James Bourne, 22 June 2016, 0 comments. Categories: Data & Analytics, Data Loss, Identity, Privacy.

The road to DevOps: How enterprises can meet the challenge

(c)iStock.com/Adventure_Photo

Few initiatives spark more turmoil within IT organisations than the shift from traditional software development and delivery to a more modern, DevOps-based approach. That’s a shame, because DevOps is a superior approach when compared to yesterday’s waterfall-style methods.

The goal of DevOps is to accelerate the delivery of services and increase software innovation by enhancing collaboration between application development teams and IT operations. Properly applied,...

By Christian Paulus, 02 June 2016, 0 comments. Categories: Applications, Data & Analytics, Development, Enterprise Mobility.

Seven tips for avoiding data migration disasters

(c)iStock.com/Peter Hermus

Whether you’re changing ERP, CRM, or other central applications, transferring data between systems is never a simple task. The complexity of data-migration jobs often results in cost overruns and delays. Mistakes made during migrations can lead to costly downtime, diminished end-user productivity, and the loss of important data.   

But if you do the necessary preparation work and fully think through the process, you can avoid some of the most common data migration...

By Stephan Romeder, 26 May 2016, 0 comments. Categories: Cloud , Data & Analytics, Data Loss.

Automation with a twist: What Toyota can teach us about DevOps

(c)iStock.com/HJFBooysen

Let’s face it: no matter how much exciting innovation is transpiring in the automotive industry, we take cars for granted, at least a little bit. It’s okay – just admit it. You hop in, drive wherever you’re going, park and leave it in the lot without a second thought about the complex, impressive process that brought your car into your daily life.

Well, what if...

By Pete Pickerill, 19 May 2016, 2 comments. Categories: Data & Analytics, Development, Productivity.

Enterprise mobile security: A proactive approach to protecting data

(c)iStock.com/piranka

For many people, the line between work and personal life is blurred.

When it comes to mobile devices, 80% of the workforce admits to using their devices for both business and private use, which means personal data and company data will naturally converge onto a single device. What’s becoming increasingly important, is how to protect the data stored on and being accessed from these devices to ensure mobile workforce security.

So how much are those corporate emails or family photos worth to...

By SafeNet, 19 May 2016, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

Enterprise compliance and productivity: Should emails have a keep by date?

(c)iStock.com/peshkov

A recent report by Radicati revealed that the number of business emails sent and received per user per day in 2015 was 122 and predicted that this will rise to 126 by 2019. That is a lot of emails and a lot of data. Add to that the growing trend for workers to store information in email inboxes, rather than saving down on file, and it has led lots of businesses and developers to...

By Robin Bingeman, 18 May 2016, 0 comments. Categories: Data & Analytics, Employees, Privacy, Security.

Salesforce makes third acquisition of the year with data entry automation startup

(c)iStock.com/Solarseven

Salesforce appears to be gunning for data driven software startups in 2016 as it makes its third acquisition in a few months.

Earlier this year, the company acquired open source machine learning server PredictionIO.

More recently, it also took on artificial learning startup MetaMind, which had been funded by Salesforce CEO Marc Benitoff.

Founder Richard Socher wrote he was “thrilled” the company had been...

By Rachael Power, 10 May 2016, 0 comments. Categories: Big Data, Data & Analytics.

IT feels overworked and undervalued, according to new research

(c)iStock.com/Hong Li

Stop us if you’re heard this one before – a new survey from computing accessories provider Kensington has revealed IT professionals feel on the whole overworked and undervalued in their organisations.

One in three (32%) IT decision makers polled say they spend more time reacting to problems in the workplace than developing their IT strategy, while IT pros spend on average 44% of their working day fixing issues. Key frustrations cited by the survey respondents include a lack...

By James Bourne, 27 April 2016, 0 comments. Categories: Cloud , Data & Analytics, Employee Education, Employees, Productivity.

Samsung KNOX recognised by Gartner as “strongest” mobile security platform

(c)iStock.com/KreangchaiRungfamai

Good news for Samsung’s mobile enterprise efforts; the company’s KNOX product has been recognised by analyst house Gartner with the most ‘strong’ ratings in its latest mobile security report.

The report, which was published earlier this month, examined core OS security features as well as the enterprise management side, and found KNOX to be at the top of the file for corporate managed security, as well as in more specific categories such as...

By James Bourne, 14 April 2016, 0 comments. Categories: Data & Analytics, Enterprise Mobility, Samsung, Security.