Enterprise Information Management

Enterprise Information Management
If these companies were affected then the foundation of computing could be at risk. If you could manipulate at the hardware layer via the firmware, BIOS, ect then a threat actor could weaponize well below the operating system which brings in to question the integrity of the entire computing stack and everything above it.  The firmware and bios are like the rebar and concrete for a building. If that foundation is weak then the entire structure and anything dependent on it is at risk. We cannot underestimate the potential or the severity of these companies being potentially affected by the SolarWinds hack and what that means for the foundational computing hardware they provide to the world.  What do others think ?  How could this impact your organization ?   Big tech companies including Intel, Nvidia, and Cisco were all infected during the SolarWinds hack - The Verge

Top Answer :

What are your thoughts on SaaS management platforms (SMP)?

Top Answer :

12 views
0 comments
3 upvotes
Related Tags
Business Application Development
Architecture & Strategy
Maintenance
Requirements & Design
Testing, Deployment & QA
Mobile Development
Development
Selection & Implementation
Business Analysis
Applications Vendor Landscapes
Optimization
Backup
Data Center
Public and Hybrid Cloud
Telephony
Network
Compute
Storage
Business Applications
Cloud
Crisis Management
Data & Business Intelligence
Artificial Intelligence
Business Intelligence Strategy
Data Management
Enterprise Integration
Integrations
Machine Learning
Governance
Data Lake
Big Data
Data Warehouse
Disruptive & Emerging Technologies
5G
Blockchain
Cryptocurrencies
Virtual Reality
IoT
Reality
Digital Innovation
Bots
Augmented Reality
End-User Services & Collaboration
Collaboration solutions
End User Equipment
End-User Computing Devices
Endpoint management
Productivity tools
Document Management
End-User Computing Applications
End-User Computing Strategy
Mobile
Voice & Video Management
Continuous Integration
Technical Product Management
DevOps
Continuous Deployment
Development
Quality Assurance
Customer Relationship Management
Enterprise Content Management
Customer Success
Enterprise Information Management
Finance
Enterprise Resource Planning
HR
Legal
Marketing Solutions
Retail
Human Resource Systems
Marketing
Product Recommendation
Sales
Risk Management
GDPR
SOX Compliance
Governance, Risk & Compliance
Infrastructure & Operations
Cloud Strategy
I&O Finance & Budgeting
Operations Management
Network Management
DR and Business Continuity
Server Optimization
Leadership
Attract & Select
Cost & Budget Management
Engage
Culture
Manage Business Relationships
Innovation
Organizational Design
Program & Project Management
Train & Develop
Values
Talent management
Performance Measurement
Organization Structure
Manage & Coach
Availability Management
Financial and Vendor Management
Reporting
Service Desk
Management Tools
Enterprise Service Management
People & Process
Process Management
Asset Management
Project & Portfolio Management
Portfolio Management
Project Management Office
Pulse
Security
Confidentiality, Integrity, Availability
Secure Cloud & Network Architecture
Endpoint Security
Data Privacy
Identity and Access Management
Security Operations Center
Security Strategy & Budgeting
Security Vendor Landscapes
Threat Intelligence & Incident Response
Threat & Vulnerability Management
Vendor Management
Infrastructure Vendor Landscapes
Budgeting
Roadmap
Outsourcing
Strategy & Operating Model
Business Continuity
Architecture Domains
Strategy
Tool Recommendation
Is it possible to aggregate Big Data for intelligence purposes without sacrificing risk mitigation?

Top Answer : I’m not sure if there is an appropriate line to draw between risk mitigation/compliance and giving access to data to the right folks so that intelligence can be derived. The challenge is extracting the purified content out of it—leave out the noise and pick up the signals so that you can do something with them. With all of these different platforms and cloud solutions that folks are adopting, their data footprint ends up all over the map. At some point people want to put it together, make connections across these data sets to derive intelligence for operational efficiencies, new market identifications, optimizations and new service offerings.

Which Zero Trust solutions are most effective at protecting data at the enterprise level?

Top Answer : Another security concept here is the “Secure Access Service Edge” (SASE).  You purchase the entire remote access and security stack outside your own data centers. It’s particularly good for companies that are national or international because a large provider can provide those access points no matter where they are. We're used to the model of surrounding everything with a fortress, with remote access servers granting access at the edge, plus all the services needed to decide whether you let them in or not. The SASE concept is about buying that as a service and it fits in with Zero Trust. Instead of using your own bandwidth in and out of your company, a user’s remote access laptop would connect to the SASE provider (such as vendor Zscaler), and they do the authentication and security.  With Office 365, for example, user traffic can simply be routed directly to Microsoft, with no need to route that back to your own data centers. The SASE vendor needs a link to your Active Directory to authenticate users, but in some cases, if they're using email and SaaS, users are redirected out to the Internet from there, and their traffic may never even come back into to your “fortress” and your data center unless the user starts using an in-house application. Then only that traffic would come back to your fortress. If the user needs Office 365, just route them there. If they're going to some SaaS platform, just send them to where that’s hosted.  There’s no need to send user traffic back to company data centers at all unless they really need to come back there for it.  Oh, OK, it sounds like we’ll be discussing SASE technology in the next session!