By using tdwi.org website you agree to our use of cookies as described in our cookie policy. Learn More

TDWI Articles

Data Digest: Protect Your Enterprise and Understand the Cloud

Learn how to protect your enterprise from shadow IT solutions, how to secure your network by securing your endpoints, and how to evaluate the full value of cloud computing.

Keeping Shadow IT Safe

Shadow IT refers to internally built technology solutions that were never approved by IT. These projects are often the most vulnerable to breaches. This article discusses how to ensure your enterprise is not damaged by shadow IT or other poorly implemented data storage solutions.

Read more at ITProPortal.com

Protect the Endpoint First

One of the biggest cybersecurity challenges today is the variety and vulnerability of endpoints in a network. The number of different devices throughout an enterprise makes it difficult to effectively protect them all. This article explains tactics for securing the endpoints.

Read more at Information Age

The True Value of the Cloud

The shift to cloud computing has brought on a revolution in the enterprise. One piece of that revolution is in the economics of the cloud. According to this article, it doesn't work to measure the value of the cloud in only financial terms because the cloud delivers value in ways traditional cost-benefit formulas cannot model.

Read more at Forbes

About the Author

Quint Turner is an editorial intern at TDWI and an undergraduate English student at Skidmore College. Follow his blog at pungry.com.


TDWI Membership

Accelerate Your Projects,
and Your Career

TDWI Members have access to exclusive research reports, publications, communities and training.

Individual, Student, and Team memberships available.