Research & Insight

Research & Insight

security

Privacy Concerns and the Monetization of Big Data

Outsourcing Center, Patti Putnicki, Business Writer

It is easy to get caught up in the greatness of Big Data analytics. It’s a marketer’s dream: tracking customer activity; understanding what he or she is thinking, doing—using this information to transform every interaction into unexpected delight. To know the customer is to love the customer, and companies everywhere are showing that love through …

CyberSecurity Professionals and Compliance Officers at Odds Over Cloud Security

Outsourcing Center, Staff Writer

Enterprise IT and compliance groups agree on one thing for certain: their cloud environments could use some work on the security front. Less than half of the 1,018 IT security practitioners and enterprise compliance officers surveyed by the Ponemon Institute, which conducts independent research on privacy, data protection and information security policy, believe their organizations …

Managing Enterprise Mobility in a Bring-Your-Own-Device World: Trends, Challenges and the Role of Outsourcing

Outsourcing Center, Patti Putnicki, Business Writer

It is the era of the 24/7 employee – but no one seems to be complaining. Cloud computing, collaboration convergence and the need for access-on-the-go have driven a surge in mobility technologies. Instead of wanting to “get away from it all,” people want to take it all with them – accessible through the lightweight devices …

Eight Biggest Areas of Risk for Buyers of Outsourcing Services

Outsourcing Center, Kathleen Goolsby, Senior Writer

New delivery models, new pricing models, service providers’ new marketing strategies, moving up the value chain to intellectual arbitrage, new technologies, real-time customer interaction, globalization, and new standards and regulations – these factors set the stage for risks for buyers of outsourcing services in the next two to five years. (Read Forces of Change Shaping …

Buyers Face Decisions around New Opportunities and Risks in Outsourced IT Solutions

Outsourcing Center, Kathleen Goolsby, Senior Writer

Buyers must face decisions around new risks and opportunities in outsourced IT solutions. Charlie Bess, HP Fellow, HP Enterprise Services, says the outsourcing industry is facing “a different kind of IT and support environment than what we had just a few short years ago.” Here’s how he describes this new environment: More sensors deployed in …

Application Management Outsourcing Services Provide Bigger Bang for the Buck

Outsourcing Center, Kathleen Goolsby, Senior Writer

Increased business agility is a big driver of the increase in application management outsourcing (AMO), notes Marc Schwarz, Senior Vice President and leader of the Oracle On Demand business. Businesses want to focus more of their resources on developing new innovations that increase revenue and profits. But he states that reducing business risk is the …

Managing Outsourced Data Securely

Outsourcing Center, Kathleen Goolsby, Senior Writer

Outsourced data security is revolutionizing businesses. “We will see a dramatic change in security becoming a prevalent component of outsourcing contracts over the next five years,” says Jim Motes, Chief Information Security Officer for Dell Perot Systems. As virtualized services in cloud and utility computing technologies become more ubiquitous, they will drive an even deeper …

How and Why Cloud Computing Will Change Outsourcing Services

Outsourcing Center, Kathleen Goolsby, Senior Writer

Technology enables business change, but it doesn’t drive it. Jim Stikeleather, Chief Technology Officer at Dell Perot Systems, says change doesn’t happen unless there is an economic value. And that’s why cloud computing will make such a huge impact on outsourced services. It changes companies’ ability to consume IT. “This will create a very different …

Legal Voice: If There’s a Data Security Breach, Who’s Responsible and Who Pays the Fine?

Outsourcing Center, Beth Ellyn Rosenthal, Senior Writer

Data security has become the number one issue in outsourcing contract negotiations, reports John Delaney of Morrison & Foerster. Buyers believe suppliers have superior processes, so they should be responsible for security breaches. But suppliers know no system is immune. Here’s how to handle the conflict.

Connect with a Sourcing Advisor at Outsourcing Center

"*" indicates required fields

Let’s talk more

Consult Form

"*" indicates required fields

This field is for validation purposes and should be left unchanged.