How Monitoring Systems Reduce Human Error in Distributed Server Rooms and Remote Wiring Closets
[ Source: APC ]
October 2011-
Surprise incidences of downtime in server rooms and remote wiring closets lead to sleepless nights for many IT managers. Most can recount horror stories about how bad luck, human error, or just simple incompetence brought their server rooms down.
This paper analyzes several of these incidents and makes recommendations for how a basic monitoring system can help reduce the occurrence of these unanticipated events.
Classification of Data Center Management Software Tools
[ Source: APC ]
October 2011-
Data centers today lack a formal system for classifying software management tools. As a result, confusion exists regarding which management systems are necessary and which are optional for secure and efficient data center operation.
This paper divides the realm of data center "Operations Technology" into four distinct domains and compares the primary and secondary functions of key subsystems within these domains. With a classification system in place, data center professionals can begin to ...
The Directory-Enabled PKI Appliance: Digital Signatures Made Simple
[ Source: ARX, Inc. ]
February 2007-
This paper presents a novel approach for a PKI-based digital signature system for documents in an enterprise setting. A centralized appliance securely stores users' private signing keys. The appliance interfaces with the existing enterprise directory to automatically provision users' keys and certificates. Users authenticate to the appliance using their existing directory credentials in order to access their signing keys. Client applications send document hash values to the appliance to be signed, therefore the signing keys ...
The State of Content Management in Financial Institutions
[ Source: ASG Software ]
July 2011-
Financial institutions rely on content to drive strategic decision-making, mitigate risk, meet regulatory and compliance requirements, service customers and streamline operations. Yet many financial firms -- including banks, insurance and investment firms -- continue to struggle to manage their exploding volumes of content generated throughout the organization, whether it is structured content generated from disparate transaction processing systems or unstructured content such as user-generated spreadsheets, email exchanges or compliance documents.
Read this whitepaper ...
Best Practices for Secure Enterprise Content Mobility
[ Source: Accellion ]
September 2012-
The proliferation of mobile devices and the popularity of Bring Your Own Device (BYOD) are creating new security challenges for enterprises. Employees are using devices such as iPads and smartphones to access and store business data. And they're relying on email and consumer-grade file-sharing services to share and access this data. As a result, enterprise data has never been easier to access and more difficult to secure.
To secure mobile devices while enabling ...
Putting IT Back in Control of BYOD
[ Source: Accellion ]
September 2012-
Osterman Research conducted a survey of 760 individuals with regard to the BYOD issues they face in their organizations. Personally owned Apple iPhone and iPads, as well as Android smartphones and tablets, are more common than their company-supplied counterparts.
The research also found widespread use of third party, cloud-based storage and file synchronization offerings that are sometimes used with IT's blessing, but more often not. Dropbox, for example, is used in 14% of 1,000+ employee organizations ...
The Need for Enterprise-Grade File Sharing and Synchronization
[ Source: Accellion ]
September 2012-
Cloud-based file-sharing and synchronization solutions are among the most popular applications used in the workplace.
Many of these solutions, classified as "consumer-focused" because they are typically deployed by individual users and not as part of a coordinated IT plan, offer tremendous usability. By synchronizing files across a variety of platforms-desktop, laptop, smartphone and tablet-these tools enable users to have near real time access to all of their content from any platform and any ...
10 Mobile Security Requirements for the BYOD Enterprise
[ Source: Accellion ]
September 2012-
An enterprise mobility strategy needs to include more than the provisioning and security services made available through mobile application and Mobile Device Management (MDM) solutions.
To meet the mobility and security requirements of road warriors and other mobile users, enterprises need to look at deploying a solution for mobile content management.
An effective mobile content management solution supports Bring Your Own Device (BYOD) policies, enables authorized users to share files of ...
Aberdeen Group Analyst Insight: Left to Their Own Devices: Does Your Enterprise Have a Dropbox Problem?
[ Source: Accellion ]
September 2012-
In the absence of well-defined policies, awareness and education, and officially supported alternatives for sharing files securely, knowledgeable end-users will often overlook security and compliance in favor of getting the job done by taking advantage of free and readily available alternatives.
Top-performing organizations are able to support the business objectives of end-user productivity, convenience and collaboration while simultaneously sustaining the organization's requirements for security, compliance, and cost-effective management.
Download this Analyst ...
Evaluating Cloud File Sharing and Collaboration Solutions
[ Source: Accellion ]
September 2012-
Consumerization has had a broad impact on IT-users are bringing in their own devices and subscribing to their own applications without waiting for the IT department' permission. Users want and need to be able to access documents from multiple devices and are subscribing to consumer applications like Dropbox to share files between devices and collaborators.
This creates a tremendous challenge for IT, which is in charge of managing and protecting corporate information assets, ...