Samuel Greengard is a business and technology writer based in West Linn, Oregon. He is author of The Internet of Things (MIT Press) and Virtual Reality (MIT Press).
The web and mobile technology have profoundly changed the way organizations do business. The ability to collect more and more granular data about consumers, including existing customers, changes the way businesses market, advertise and sell products and services. In some respects, web and mobile analytics has made it easier to establish closer relationships. But the […]
Business intelligence (BI) and advanced analytics are now at the center of operating a successful enterprise. They deliver insights into complex issues, patterns and trends that would have once flown beneath the radar. As a result, savvy organizations are increasingly tapping these tools along with rich data sets—originating from point of sale (POS) systems, ERP […]
Data is now at the center of everything digital—and protecting it is a growing headache for organizations large and small. One of the keys to addressing this challenge is data loss prevention (DLP). It relies on software algorithms to detect potential anomalies, ex-filtration transmissions and data breaches. DLP protects against misuse and abuse—as well as […]
Mobile technology has arrived at the center of the enterprise. Almost every business process, workflow and task intersects with mobility in some way. What’s more, as the internet of things (IoT) takes shape and Industry 4.0 technologies take hold, the need for secure mobile devices and systems grows. Protecting devices and data is no simple […]
It’s no secret that cloud computing has changed enterprise security requirements. As organizations adopt new services, applications and methods to manage data, the need to address changing data models and threat risks is essential. According to Alert Logic’s 2017 Cloud Security Report, the number of cloud security incidents occurring in an 18-month span extended beyond […]
Firewalls have long been a staple of enterprise security. They have played a key role in filtering content and protecting IT systems. But in today’s high-risk business landscape, first and second-generation devices aren’t enough to protect against increasingly sophisticated attack methods. They also don’t reflect the needs of organizations in the cloud. As a result, […]