Governance, compliance and Privacy

September 25, 2010

Establishing a Data-Centric Approach to Encryption

Author Marcia Kaufma, COO and Principal Analyst Sponsored by Voltage Security Many data breaches occur at companies that already have a data security policy in place. While some of the millions of stolen credit card numbers have been easily lifted from unsuspecting companies with unprotected data, an increasing number of companies implement data security technology […]

0 Comment
November 1, 2006

SOA Governance: Maximizing Reuse and Flexibility of IT Resources through SOA

Authors Judith Huwitz, CEO Marcia Kaufman, COO and Principal Analyst Sponsored by IBM As SOA takes hold in companies, IT is charged with creating and managing business services. There is a major transition underway in terms of how organizations view their information technology platforms. Indeed, since more aspects of the business have been automated over […]

0 Comment
December 1, 2005

“The Business Applications of Identity Resolution”

Authors Robin Bloor, PartnerDr. Fern Halper, Partner Sponsored by IBM The sharing of personal data in this secure way is of particular use in situations where the data being shared is highly sensitive.All organizations hold and use information about people. These people may be customers, employees, contractors, agents, suppliers, or contacts. The information that is […]

0 Comment