article thumbnail

The move toward enterprise security technology integration

Network World

82% of survey respondents “strongly agree” or “agree” with the statement: "My organization is actively building a security architecture that integrates multiple individual product." This is likely part of a SOAPA (security operations and analytics platform architecture) project. Here are the results: .

article thumbnail

8 strategies for accelerating IT modernization

CIO Business Intelligence

And with infrastructure and application modernization cited as key reasons for CIOs’ budget increases this year, according to the 2024 State of the CIO Survey, that pace is not fast enough. Those principles are data centric, platform first, cloud based, automation led, and zero trust (so that everything is secure from the start).

Strategy 140
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 ways to maximize your cloud investment

CIO Business Intelligence

We also use Microsoft Power BI, a customer experience platform to survey customers, and we review support tickets to determine where any problems may lie,” he says. “We You also sacrifice the opportunity to standardize on optimization, operations, security management and so on,” he adds.

Cloud 117
article thumbnail

The year’s top 10 enterprise AI trends — so far

CIO Business Intelligence

AI vendor management Only the biggest companies are going to build or manage their own AI models, and even those will rely on vendors to provide most of the AI they use. One thing buyers have to be careful about is the security measures vendors put in place. But do they have something truly sellable?”

article thumbnail

The Holistic IT Governance

Future of CIO

This should give a clear idea about the maturity of IT function (Sourcing Unit, Order Taker, Solution Provider, Innovation Partner) - A CXO survey could help at this stage. (3) Business Management- Projects, Innovation, Demand c. Sourcing, Vendor Management, and Control d. 2) Assess IT performance.

article thumbnail

Why Organizations Fail to Secure Third-Party Remote Access

SecureWorld News

In the latest episode of our Behind the Scenes interview series, we're looking at a crucial question: Why do so many organizations fail at securing third-party remote access? Our exclusive interview is with Rob Palermo, Vice President of Product Management and Strategy at SecureLink, which specializes in Privileged Access Management (PAM).

article thumbnail

Weighing risk and reward with gen AI vendor selection

CIO Business Intelligence

According to an O’Reilly survey released late last month, 23% of companies are using one of OpenAI’s models. We look at the vendor’s maturity and if they have proven success in the right focus areas for our business,” he says. Established vendors are racing to add generative AI to their products and services as well.