Enterprise Content Management

While the cloud has delivered massive cost and agility benefits for businesses in all industries, there is one counterintuitive challenge being created by the unlimited storage capacity it offers. Because businesses can access virtually limitless storage at a low cost, they no longer have to focus on deleting anything. This means businesses are unlikely to have deletion policies in place for the cloud.

A major privacy fault line has just been revealed as “anonymized data” is now exposed to be not so anonymous after all. An article published by the New York Times reports that new technology can frustrate present efforts to keep data private in a July 23, 2019 article, Your Data Were ‘Anonymized’? These Scientists Can Still Identify You.

Consider the data that drives your organization, from spreadsheets to emails, reports, presentations and even text messages. Effective information governance ensures security and accessibility of that information while improving regulatory compliance and reducing data storage costs.

The enterprise content management (ECM) market is in transition as cloud and hybrid deployments, gain traction, according to a new report from industry analysts Forrester.

Information Governance ANZ has announced results of its second survey on trends in Australia and New Zealand, which found that implementing an IG framework is the most important priority for organisations, with the three main drivers of IG projects identified as good business management practices (up 16% on the 2017 survey), external regulatory, compliance or legal obligations and internal technology restructuring or transition.

iland, a provider of secure application and data protection cloud services built on VMware technology, has announced the availability of Secure Cloud Object Storage in Australia to simplify management of unstructured data.

archTIS Limited, the cybersecurity company specialising in protecting sensitive information, has signed a reseller partnership with TEAM Asparona for the commercialisation of its “Kojensi Gov” secure Content and Collaboration platform offering in New Zealand.

The Australian Cyber Security Centre (ACSC) is warning small to medium sized businesses supplying IT and electrical products of a social engineered email scam requesting quotes on goods.

According to a new global survey from CyberArk, 50 percent of organizations believe attackers can infiltrate their networks each time they try. As organizations increase investments in automation and agility, a general lack of awareness about the existence of privileged credentials – across DevOps, robotic process automation (RPA) and in the cloud – is compounding risk.

Businesses have always had to navigate change, driven by many factors, including the introduction of new technologies, requirements to move into new markets, competitive pressures, or increased regulatory scrutiny.

Pages