Default HubSpot Blog

How is big data spreading across departments?

Posted by Laura Hayes on Apr 22, 2015 5:03:00 PM

One of the most important trends to watch in the big data market is the increasing desire of IT leaders and other executives to enable the use of the tools among other employees, which is no easy task given the complexity of the technology. For example, individuals in the human resources department might have no idea what the best practices of general data management entail, not to mention advanced analytics and business intelligence. 

Read More

Topics: Big Data

Data security concerns linger in health care

Posted by Laura Hayes on Apr 20, 2015 5:54:00 PM

Medical organizations in North America and overseas have been targeted more frequently by hackers and cybercriminals in the past few years, and it appears as though the villains in this story have had the winning edge thus far. Experts and advocacy groups, alongside lawmakers in federal and state governments, have appeared to increase efforts to strengthen security in health care, but the endeavours have yet to make a big difference in terms of breach frequency and damage. 

Read More

Topics: IT Security

Cloud computing adoption still has room to grow

Posted by Laura Hayes on Apr 16, 2015 2:52:00 PM
Despite the fact that cloud computing has been such a revolutionary technology that seemingly exists in all organizations and households today, some industries and government agencies have not yet gotten on board with the solutions. Balking on cloud services will often represent a significant error on behalf of enterprises, as well as a missed opportunity, as the technology has proven to reduce expenditures while expanding upon the flexibility and power of its adopters. 
Read More

Topics: Virtualization, Cloud

EMC's Federation - A business model that matches today's market velocity

Posted by Aoife McMonagle on Apr 10, 2015 11:13:00 AM

By Eric Ng, EVP Sales.

Read More

Topics: Infrastructure, IT Security, Cloud, Private Cloud, Virtualization and Cloud, Storage, Security

How to Build More Robust BYOD Security (Infographic)

Posted by Aoife McMonagle on Apr 7, 2015 9:18:00 PM

There is no denying that enterprise mobility has been one of the most challenging trends for businesses and others when it comes to security throughout the past several years. Studies indicate that decision-makers have largely struggled to strike the right chord when writing policies, enforcing the protocols and ensuring seamless protection of data traveling into and out of mobile devices such as smartphones, tablets and portable computers.

Read More

Topics: IT Security, Cloud and Data Security, Infographic, Mobility Security

Medical firms move on big data security initiatives

Posted by Aoife McMonagle on Apr 7, 2015 6:07:14 PM

Security has been one of the more exciting themes in big data's progression throughout the past several years, as more organizations are looking to improve threat mitigation and reduce risk through the use of modern intelligence and analytics solutions. Because so much valuable information is generated both within a company's infrastructure and outside of it every day, the use of big data for security purposes has proven to be a next-generation pursuit with significant advantages to come.

Read More

Topics: Big Data

Some sectors struggling with IT security

Posted by Aoife McMonagle on Apr 2, 2015 12:07:15 PM

Data security remains a major issue for virtually every household, government agency and business in the world, yet the best practices and actual threats seem to be misunderstood. Whether it is because total protection is not attainable or individuals have been desensitized from data breaches because of how frequently they occur, exposure and theft are running amok.

Read More

Topics: IT Security

App management moves to forefront of mobile need

Posted by Aoife McMonagle on Apr 2, 2015 9:07:15 AM

When enterprise mobility first became a core business strategy, studies indicated that the majority of companies were not quite striking the right chord with respect to comprehensive management of devices, users, applications and backend systems. Because this was one of the first hints at what has become the major trend of consumerized IT, it made sense that the average firm was struggling to get the policy and management angles into the right positions. 

Read More

Topics: Mobility Security

Mobility security might not be progressing

Posted by Aoife McMonagle on Mar 31, 2015 7:07:17 PM

One of the main themes in the IT security community throughout the past five years has been the threat that mobile devices and applications present to business data and systems. At first, reports found that companies were far behind the eight ball, not putting nearly enough time, energy or budget into the development of strong mobility security strategies, procurement of the right monitoring tools and otherwise, but this then became a bit brighter as time went on. 

Read More

Topics: Mobility Security

In focus: Technology's impact on competition

Posted by Aoife McMonagle on Mar 27, 2015 7:07:13 PM

The private sector has become a more robust and diverse battleground of late, with smaller, medium-sized and larger enterprises seeing the playing field level with greater consistency as the years go on. One of the key drivers of the level playing field has been modern IT, although most notably cloud computing solutions that have made it more possible for entrepreneurs to get their feet on the ground and gain traction without as much financial backing. 

Read More

Topics: Virtualization and Cloud