Data Loss Detection and ProtectionBy Arnita Chakravorty On 20 Jul 2016
Over the past few years the risk about data loss has increased exponentially. The key attacking factor for a data loss event is people – they handle electronic data and make mistakes.Data loss could be from any of the aspects...
Unified Communication – Integration for efficiencyBy Arnita Chakravorty On 12 May 2015
With the explosion of radical disruptive technologies like Big Data, Mobility, Cloud Computing and Social Media, communication has been continually redefining itself to fit into an evolving ecosystem. We've known for years that 'voice' is just a piece of the...
Why SaaS? We mean, Security-as-a-Service!By Arnita Chakravorty On 18 Dec 2014
Though easily understood as a Cloud-based service model, Security-as-a-Service also does imply to in-house security management provided by an external service provider. Going by Gartner's prediction made in 2013, cloud-based security services market that involves web or email gateways, remote...
The evolution of GRC StrategiesBy Arnita Chakravorty On 1 Sep 2014
Setting up an effective framework around governance, risk management and compliance is imperative for organizations both, small and large today. To better understand the degree of importance of this robust framework, it is essential for companies to comprehend how GRC...
How does business drive technology requirementsBy Arnita Chakravorty On 11 Aug 2014
Business-Driven Technology A business-driven technology strategy articulates the capabilities required for the success of an organization. To align business-technology investments with business strategy, focus needs to be on the type of value that the business aims to create. Decisions on...
These blogs might interest you
by Mouna Ramesh on 28 Aug 2019
by Subramanya Ajjampur on 2 Aug 2019
Zero Trust Networks offer protection against many data breaches, but the way to them can be difficult
by Jyoti Bilgoji on 22 May 2019
by Viswanath Subramaniam on 29 Mar 2019
Subscribe for blog updates