Portal:Information Security

From Wikibon

(Difference between revisions)
Jump to: navigation, search
(Created page with '<meta name="description" content="The Wikibon Information Management Research Portal contains information management research, articles, expert opinion, case studies, and company...')
Line 1: Line 1:
-
<meta name="description" content="The Wikibon Information Management Research Portal contains information management research, articles, expert opinion, case studies, and company profiles." />
+
===Featured Research===
-
<meta name="title" content="Information Management Research Portal" />
+
[[Image:Data_Encryption.jpg|250px]]
-
 
+
==[[Data encryption strategies]]==
-
__NOTOC__
+
<p style="color: #666;">As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.  
-
'''Welcome to Wikibon's Information Management (IM) Portal.'''
+
</p>
-
The IM Portal is a resource for information professionals with technology and business backgrounds interested in leveraging information to increase organizational value and manage risk. We welcome you to join Wikibon, browse the portal and participate. You can write a Wikitip, Ask a Question or attend a Peer Incite Research Meeting.
+
[[Data encryption strategies | read more...]]
-
 
+
-
The Wikibon Information Management Research Portal contains information management research, articles, expert opinion, case studies, and company profiles.
+
-
 
+
-
'''''<u>Check out these IM Peer Incite Podcasts and Reports</u>:'''''
+
-
 
+
-
 
+
-
'''''1. NetApp and Wikibon Community on Using Sourcing Strategies to Modernize Legacy Information Infrastructures''''' 
+
-
 
+
-
*[http://wikibon.org/wiki/v/Using_sourcing_strategies_to_modernize_legacy_systems Read the Research Notes from this Meeting]
+
-
 
+
-
 
+
-
'''''2. Execs from the Energy, Healthcare, and Financial industries on the transition to 21st Century Information Management'''''
+
-
 
+
-
*[http://wikibon.org/wiki/v/Building_a_strategic_information_plan_to_tame_unstructured_data Read the Research Notes from this Meeting]
+
-
 
+
-
 
+
-
'''''3. X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part 1-- The Problem Statement''''' (19:48)
+
-
{{Click||image=Icon_listen.gif|link= Media:02-03-09_Peer_Incite_mashup.mp3 | width=67px|height=16px}}
+
-
*[[Managing Archiving and Retention Risk|Read the research notes from this meeting]]
+
-
 
+
-
 
+
-
'''''4. X-Pfizer IT Exec Unlocks Legal Risk Secrets - Part 2-- The Architectural Solution''''' (19:48)
+
-
{{Click||image=Icon_listen.gif|link= Media:02-03-09_Archiving_Retention_Mashup_Part_2‎.mp3 | width=67px|height=16px}}
+
-
*[[Managing Archiving and Retention Risk|Read the research notes from this meeting]]
+
-
 
+
-
 
+
-
'''''5. Peter Burris summarizes how Email archiving is moving from the server room to the court room to the board room''''' (5:47)
+
-
{{Click||image=Icon_listen.gif|link= Media:E-Mail_archiving_summary.mp3 | width=67px|height=16px}}
+
-
*[[Email Archiving|Read the research notes from this meeting]]
+
-
 
+
-
 
+
-
 
+
-
{|
+
-
|+
+
-
| colspan="2" | <tipoftheday category="Information_Management_wikitips"/>
+
-
 
+
-
[[:Category:Information Management wikitips|Browse all Information Management Wikitips]]
+
-
|+
+
-
| width="50%" valign="top" |
+
-
===Featured Case Study===
+
-
[[Image:retail.jpg|200px]]
+
-
 
+
-
==[[Implementing email archiving in retail|Retail Giant Tackles Email Archive]]==
+
-
<p style="color: #666;">CS5 is retail organization with over 250,000 employees. The Exchange email system has about 75,000 seats and about 500,000 messages every day. In retail, margins are thin and CS5's strategy is to focus the Email archive only on the most important senior managers while aggressively deleting emails of other employees after a short period of time. </p>
+
-
[[Implementing email archiving in retail|read more...]]
+
| valign="top" |
| valign="top" |
-
{{Information Management professional alerts}}
+
{{Information Security Professional Alerts}}
|+
|+
| valign="top" |
| valign="top" |
-
===Featured How-to Note===
+
===Featured How-To Note===
-
[[Image:email archive.jpg|left|200px]]  
+
[[Image:Storage_Security.jpg|left|250px]]  
|
|
-
==[[Email archiving|Implementing an Email Archive]]==
+
==[[Implementing storage network security]]==
-
<p style="color: #666;">Ninety percent of business communication is done by email, instant messaging (IM) and voicemail, all of which are electronically stored.
+
<p style="color: #666;">In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems.
-
 
+
</p>
-
The main body of evidence that put Arthur Anderson out of business in 2002, after 89 years, came from email. Citigroup paid $400 million in fines after Elliot Spitzer subpoenaed emails written by stock analyst Jack Grubman.</p>
+
[[Implementing storage network security | read more...]]
-
[[Email archiving | read more...]]
+
|}[[Category:Information Security Wikitips]][[Category: Mobile Enterprise Wikitips]][[Category: Storage security]][[Category: Wikitips]]
 +
more...]][[Category:Information Management wikitips]][[Category: Wikitips]]

Revision as of 02:55, 30 September 2009

Contents

Featured Research

Data encryption strategies

As the amount of digital data grows, so does the exposure to data loss. It is difficult to find a day when there hasn’t been a high-profile data security incident. The risk has reached such a level that data encryption is being implemented for stored data and mobile data, in addition to the traditional use of encrypting data in transit via the network.

read more... | valign="top" |

Information Security Professional Alerts


Browse all Information Security Professional Alerts

|+ | valign="top" |

Featured How-To Note

|

Implementing storage network security

In the early days of the computer industry, storage systems were physically large and resided within the confines of a controlled data center environment. Storage systems have evolved into lightweight devices and are easily accessible over corporate networks, making them more vulnerable to security breaches. Fueled by the growing costs of recovering from intrusions, public concerns over privacy and identity theft, and increased government regulations, businesses are spending more time and money to develop or improve storage network security systems.

read more... |} more...]]

Personal tools