Top Banner

of 19

IT in Europe_final

Apr 04, 2018

Download

Documents

kadir.azam45
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
  • 7/30/2019 IT in Europe_final

    1/19

    IT in Europeaugust 2012, volume 4

    Gain a complete overview of European IT in todays marketplace.

  • 7/30/2019 IT in Europe_final

    2/19

    IT In EuropE augusT 2012 2

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    editors letter

    on the face it, mst irmatisecurit experts will welcme theEurpea Uis mve t har-mise data prtecti regulati

    acrss the EU. The mix dierigrules ad legislati ca be a ight-mare r a iteratial cm-pa peratig acrss Eurpe.

    But lk deeper it the prps-als ad it becmes clear the EUwats mre tha just reducigbureaucracits trig t rce achage i mid-set r hw rga-

    isatis maage ur persal data.The mst ctetius ew rule

    is data breach ticatieec-tivel makig it illegal r rms t

    hide a data lss. I recet ears, wehave see the damagig eect the reputati cmpaies thathave bee hacked ad had custm-er data expsedS, LikedI,

    RSA, Lckheed Marti, eve theUKs HM Reveue ad Custmsi u g back a ew ears. S itsuderstadable that rms wuld

    wat t keep quiet abut breaches,give all the bad publicit.

    But the EU is eectivel sa-

    ig that the time r such secrechas passed. Thats a big chagei thikigrm puttig i placeplas t prevet ae dig utabut a leak, t havig plas t mit-igate the risks such a leak kw-ig that ever aected custmerwill be tld abut it.

    The small prit the legisla-ti is gig t be egtiated idetailad ull see plet lb-big rm big busiess t waterit dwbut the EU shuld stad

    rm. I the digital era, data prtec-ti must be abut prtectig thedata weru ad met thecmpa that we pass that ir-

    mati ver t.I this issue IT in Europe, we

    examie the views the experts the ew EU ramewrk, adassess what it meas r EurpeaIT maagers. But read betwee the

    lies tthis is a sig thigs tcme r EU legislati ad cmpli-ace i IT securit. n

    BrYAN GliCK

    Computer Weekly Editor in Chief

    compLiance and risk

  • 7/30/2019 IT in Europe_final

    3/19

    IT In EuropE augusT 2012 3

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    dAtA ProteCtioN FrAmeworK: A Cisos PersPeCtive

    ince the drat legisla-

    ti was published iJauar, EU memberstates have beedebatig ad egti-

    atig chages t the wa the pri-ciples will be implemeted, whichthe believe culd be raught withdiculties.

    But while egtiatis ctiuei Brussels, cmpliace ad risk

    maagers have time t wastei preparig r the ew rules thatculd cme it rce as s

    as 2013.Despite the pressure busi-

    esses ad rgaisatis i Eurpet get their huses i rder, theew rules ma t be as big a chal-

    lege as mst peple thik, accrd-

    ig t Matthew Lrd, chie irma-

    ti securit cer at IT-eabledbusiess services rm Steria UK.

    I act, he believes, much whatis ctaied i the ew regulatis

    will be busiess as usual, ad whilether elemets will require chage,

    that chage ma t be as big aspeple thik ad culd help sup-prt iteral securit risk maage-

    met prcesses.Challeges will remai, hw-

    ever, especiall i thse lbbigBrussels are uable t get a

    real ccessis ctrversialrequiremets such as data breachticati withi 24 hurs.

    This culd be challegig rma rgaisatis, especiallthse that have traditiall

    data protection framework:a cisos perspectiveCompliance and risk managers in Europe are acing one o the biggestchallenges or decades as the region moves towards a new data protection

    ramework. By Warwick Ashford

    S

    The Smarter Approach to Malware and ComplianceREAD THE ULL SToRy In ITALIAn

    http://www.01net.it/servizi/1,1641,1_SRC,00.html?qq=conformit%E0&search_mode=0http://www.01net.it/servizi/1,1641,1_SRC,00.html?qq=conformit%E0&search_mode=0
  • 7/30/2019 IT in Europe_final

    4/19

    IT In EuropE augusT 2012 4

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    dAtA ProteCtioN FrAmeworK: A Cisos PersPeCtive

    accepted higher levels risk bchsig t dela breach tica-tis r t t ti at all. The

    wuld rather risk beig ud uttha risk damage t the cmpas

    reputati thrugh disclsure.oce erced, the ew rules will

    make breach disclsure madatri a shrt perid time, pssiblrcig uecessar disclsures rver disclsures as rgaisatis

    will have little time t assess the

    real extet the breach ad estab-lish exactl what data has beeleaked.

    Securit ctrls will at smepit i time will chage the wathe busiess des busiess rmthe perspective that it wt be as

    damic as it ce was. Whe uput i place risk prcesses themake peple csider the impact

    what the are abut t d, ad isme cases will stp certai behav-iur which therere limits parts the busiess, said Lrd.

    The right t be rgtte isather priciple that will be trick

    t erce. It dictates that idi-viduals ca require erasure theirpersal data ad absteti rm

    urther distributi b the datactrller. Where data was madepublic, the ctrller shall take allreasable steps t irm thirdparties t erase liks t, r cpies the data, ad where the ctrl-

    ler authrised the publicati, itremais respsible.

    The IT impact that culd be

    hrredus. I thik [i the egtia-tis i Brussels] there is a pieceabut balacig up what is trulsesitive ad what is t, saidLrd.

    A gd wa r CISos t tacklethe cmig chages, he believes,

    is t lk at what is gig t berequired a rgaisati ad

    t use that a guide r best prac-tice where it diers rm what thergaisati is dig alread.

    The debate will be abut the24-hur perid, but Eurpeabusiesses will almst certailji their peers i mst US states

    i havig t cmpl with mada-tr breach disclsure, said Lrd,s it wuld be a gd idea t start

    preparig r that i the have tde s alread.

    But r rward-thikig rga-isatis, this shuld t be sme-thig ew. At wrst, it shuld be a

    questi re-priritisati.Icidet maagemet is sme-

    thig that I thik all cmpaieswrk t get right. All icidets

    llw a dieret path, but the cr-erste hw u hadle ici-dets is prett much the same: uget the right decisi-makers ithe rm; u act the irma-

    ti available, chsig t maage

    Eurozone Crisis Hits IT OutsourcingREAD THE ULL SToRy

    http://www.computerweekly.com/news/2240159966/Eurozone-crisis-hits-IT-outsourcinghttp://www.computerweekly.com/news/2240159966/Eurozone-crisis-hits-IT-outsourcing
  • 7/30/2019 IT in Europe_final

    5/19

    IT In EuropE augusT 2012 5

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    dAtA ProteCtioN FrAmeworK: A Cisos PersPeCtive

    expectatis iterall ad exter-all r t; the u begi theremediati path, said Lrd.

    The eect the prpsed dataprtecti ramewrk shuld t

    be t itrduce smethig ew, butt highlight the imprtace ici-det maagemet ad the eed timprve existig prcesses.

    oe the rst thigs I did wheI came t Steria was t get readpeple with the right expertise,

    iterall ad exterall, shuld weever eed them, said Lrd.Accutabilit is ather ke

    priciple the prpsed data pr-tecti ramewrk, ad it requiresdata ctrllers t maitai dcu-

    metati all prcessig pera-tis, cduct a data prtectiimpact assessmet r risk pr-cessig, ad implemet data pr-

    tecti b desig ad b deault.Agai, this is busiess as usual

    r me because as a CISo I amalwas gig t sa we shuldimplemet thigs securel, saidLrd.

    But the ew regulatis, like thepamet card idustr data secu-rit stadard (PCI DSS) ad ISo

    27001 data securit stadard, hesaid, will give CISos added authr-it whe the tell develpers adther teams i the busiess thatit is imprtat t build IT sstemsthat are secure b desig because

    it is lger gd eugh t react

    ater a evet r t trade secu-rit agaist uctialit.

    Is this chagig the wa I dthigs? nt at the mmet. But it

    des realig a cuple prjectsthat I was gig t d awa. Itrmalises thigs, puts them the startig blcks ad gives memmetum t d it, i the samewa that PCI DSS ad ISo 27001

    have de, said Lrd.

    I act, he sas that stadardslike these are i a wa the biggerchallege beig aced b rgaisa-tis i Eurpe tha the prpsedew data prtecti r a therregulati. What I am seeigicreasig, particularl rm ur cli-ets, is eed t sig up t ad c-rm t multiple rms regula-ti r stadards. I am seeig mre

    tracti rm the PCI/ISo27001tpe stadards tha I am rm aspecic piece regulati utsidebakig, ace ad gvermet,which ted t have their w ichestadards.

    Accrdig t Lrd, e the

    big dilemmas he aces as a CISois the all the cfictig regula-

    ti ad stadards he has t ace,but he has a sluti: I thik uhave t track back ad stick t thebasics. I u lk at ramewrkslike ISo27001, the give u a vergd set ctrls t perate

    UK Fails to Impress in Technology Innovation LeagueREAD THE ULL SToRy

    http://www.computerweekly.com/news/2240158766/UK-fails-to-impress-in-technology-innovation-leaguehttp://www.computerweekly.com/news/2240158766/UK-fails-to-impress-in-technology-innovation-league
  • 7/30/2019 IT in Europe_final

    6/19

    IT In EuropE augusT 2012 6

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    dAtA ProteCtioN FrAmeworK: A Cisos PersPeCtive

    t. I u set abut puttig thsei place ad make sure that uare disciplied abut implemet-

    ig thse, the u stad a gdchace passig a lt the regu-lati ut there.

    Ather big headache rCISos is that data prtectirules i sme parts Eurpe areextremel rigid ad prescriptive

    i ctrast with the UK ad therjurisdictis where the apprach is

    mre bjective-based rather thaprescriptive. Lrd believes the ewdata prtecti ramewrk willmake lie a lt easier b harm-isig these requiremets acrssEurpe, reducig the amut

    csultati he will have t d withi-cutr legal teams t esurelcal cmpliace.

    This, hwever, will t ecessar-

    il slve the risk ad cmpliacechalleges psed b the UKs Cm-puter Misuse Act ad its equivaleti Eurpe, where each cutr hasspecic requiremets. I Germa,

    r example, a results securitr peetrati testig have t staiside Germa.

    Sterias sluti is t implemeta set geeral securit ctrls

    that t mst rgaisatis require-mets, bth gvermet ad cm-mercial, which wrks r ver 80% cliets ad prvides a eas

    measure r cmpliace. Wherecliets have additial require-mets Steria implemets thse t

    esure a 100% t.Smetime we will adpt a cu-trs specic ctrl because thatis the right thig t d ad we willchage ur glbal practice t aligwith that versus ather ctrlwhere we might sa that that is

    quite prescriptive b ature versusthe risk, said Lrd.

    Where we d that ather

    cutrs piece legislati c-ficts [with Sterias deault sta-dard] ad the wat t set the barhigher, we rmall csult withthe i-cutr legal team t decidewhether we have t d that r t,

    he said.rm CISos perspective the,

    the cmig EU data prtecti

    regulatis shuld t mea radi-cal chage, but will help rmalise,priritise, supprt ad ease theimplemetati best practice idata maagemet ad cmpliaceb prvidig a sigle ramewrk

    acrss all EU member states. n

    Warwick Ashford is the security editor at

    Computer Weekly, a TechTarget publication,

    and a contributor to IT in Europe.

    A Quick Guide to IT SecurityInormation security and data

    protection is crucial or every

    business, as it is likely that your

    companys most prized asset is

    its data. Failure to secure your

    companys sensitive inormation

    could be damaging to its brand

    in addition to leading to possible

    legal ramifcations.

    http://www.computerweekly.com/http://www.computerweekly.com/http://www.computerweekly.com/guides/A-quick-guide-to-IT-securityhttp://www.computerweekly.com/guides/A-quick-guide-to-IT-securityhttp://www.computerweekly.com/
  • 7/30/2019 IT in Europe_final

    7/19

    IT In EuropE augusT 2012 7

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    seCuriNG NosQl APPliCAtioNs: Best PrACtiCes For BiG dAtA seCuritY

    udget-strapped itshps te dela

    irastructure adsstems upgrades,but ivestmets i

    mre eciet data cetre hard-ware ad stware ca result i sig-icat cst savigs ad icreasedprductivit.

    Barlw Rbbis LLP Slicitrs,

    based i Surre, Eglad, aceddata backup challeges amid tight-er budgets, grwig data vlumesad ew EU regulatr ad cmpli-

    ace laws that require legal rmst retai all cliet data r seveears.

    The IT team eeded a rbustarchivig ad backup tl tremai cmpliat ad t reduce

    backup csts. Uder its legacIT irastructure, backups tk36 hurs ad spaed acrss

    ve tapes.Due t budget limitatis, the

    rms IT sstems hadt bee

    rereshed r six ears ad admi-

    istratrs had t maage madisparate sstemseach whichcarried direct idividual csts.ol a third its servers were

    virtualised.

    The IT team made its ageigsstems mre resurceul b put-tig plaster xes acrss the ira-

    structure, but s realised thatsuch a stpgap strateg wuld tsupprt grwig vlumes data r

    infrastructure overhauLA law frm upgraded its legacy systems and deployed a newdata back up and disaster recovery strategy. Heres how it loweredcosts and improved IT efciency. By Archana Venkatraman

    Binvestments inmore efficient datacentre hardwareand software canresuLt in signifi-cant cost savingsand increasedproductivity.

    http://www.computerweekly.com/opinion/Proposed-EU-Data-Protection-Regulation-what-should-companies-be-thinking-abouthttp://www.computerweekly.com/opinion/Proposed-EU-Data-Protection-Regulation-what-should-companies-be-thinking-abouthttp://searchstorage.techtarget.com/definition/tape-backuphttp://searchstorage.techtarget.com/definition/tape-backuphttp://www.computerweekly.com/opinion/Proposed-EU-Data-Protection-Regulation-what-should-companies-be-thinking-abouthttp://www.computerweekly.com/opinion/Proposed-EU-Data-Protection-Regulation-what-should-companies-be-thinking-about
  • 7/30/2019 IT in Europe_final

    8/19

    IT In EuropE augusT 2012 8

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    seCuriNG NosQl APPliCAtioNs: Best PrACtises For BiG dAtA seCuritY

    expadig busiess.The rm had t upgrade its IT

    irastructure t supprt grwth

    ad imprve eciec, ad extedBarlw Rbbis disaster recver

    capabilities t iclude all itssstems.

    The mai bjective was texted ur data cetre ver tw

    sites s that it was lger ru-ig i a active/passive state,said J Williams, etwrk ma-ager at Barlw Rbbis.

    overcoming performance

    and disaster recovery

    challenges

    With a clear strateg ad help the clud irastructure csul-tac MTI Techlg, als basedi Surre, the IT team istalled aEMC VnX 5300 SAn with lcalad remte prtecti.

    T address the semi-virtualisedirastructure issues, it istalled aQuatum i40 tape librar ad vir-

    tualised the remaiig servers.It the depled Veeam Stware

    backup ad reprtig tlVeeam(12 scket) B&R Eterprise; Br-cade DS300 switches; ad twHewlett-Packard DL380 G7 serv-

    ers t de-duplicate all data.All the tls are cvered b

    MTIs three-ear 24x7 supprt,

    Williams said. The acial terms the MTI ctract were t dis-clsed.

    These upgrades ered ecie-cies ad mre.

    Were als seeig imprved

    prductivit as a result the lega-c sstems upgrade ad virtualisa-ti, Williams said.

    Backup and disaster recovery

    strategy yields more returns

    Prir t the ew disaster recv-er prject, Barlw Rbbis used

    a hst-based replicati sstemr disaster recver ad busiessctiuit.

    I that sstem lst ctact with

    its primar data cetre, the ailvert the backup wuld take arud

    ur hurs, Williams said.oe the ke beets the

    ew irastructure is that IT caback up all the rms data i 1.5

    one of the keybenefits of thenew infrastruc-ture is that it canback up aLL ofthe firms data in1.5 hours.

    Case Study: LeMagITREAD REnCH CASE STUDIES

    http://searchenterprisewan.techtarget.com/definition/disaster-recovery-planhttp://searchstorage.techtarget.com/magazineContent/Quality-Awards-Big-and-small-Quantum-tape-libraries-lead-the-fieldhttp://searchstorage.techtarget.com/definition/data-deduplicationhttp://searchstorage.techtarget.com/magazineContent/Host-based-replicationhttp://searchstorage.techtarget.com/definition/failoverhttp://www.lemagit.fr/type/projets/8/1/http://www.lemagit.fr/type/projets/8/1/http://searchstorage.techtarget.com/definition/failoverhttp://searchstorage.techtarget.com/magazineContent/Host-based-replicationhttp://searchstorage.techtarget.com/definition/data-deduplicationhttp://searchstorage.techtarget.com/magazineContent/Quality-Awards-Big-and-small-Quantum-tape-libraries-lead-the-fieldhttp://searchenterprisewan.techtarget.com/definition/disaster-recovery-plan
  • 7/30/2019 IT in Europe_final

    9/19

    IT In EuropE augusT 2012 9

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    seCuriNG NosQl APPliCAtioNs: Best PrACtises For BiG dAtA seCuritY

    hurs, which shrak its backupwidw b almst 400%, he said.

    The ailver time i the ew

    sstem is abut hal a hureeighth the previus sstem.

    Ather table beet is lwercst. The ewl implemeted databackup ad disaster recver strat-eg has alread cut the cmpas

    peratig expeses b 15% racial ear 2012-2013.

    We als have access t certai

    services all the time rm eachsite, Williams said. Previusl,ur DR kit had just sat idle cllect-ig dust.

    IT is als able t stre ustruc-tured ad structured cliet ir-

    mati a sigle tape, as agaistve tapes it used previusl. Thishelps IT admis save time ma-agemet tasks.

    rm a purel legal perspective,the beet has bee the resurceapplicati ur legal sstems,

    Williams said. This time last ear,I was prbabl spedig up t 40% m time getl massagig ss-tems. This has w bee reducedt as little as 5%.

    It basicall meas that I ca wsleep easier, Williams added. n

    Archana Venkatraman is the site editor

    of sechVitlDtCete.c.uK and a

    contributor to IT in Europe.

    compLiance andrisk channeL coveragenBg C incang scy rk

    F a akng c h bg kng xpng h c-

    y k an h ny ha bng pn pnay bng a n

    yng cnf h nncay cpanc gan.

    nrgay P ra P rk managn Cn

    A cn y h ha n ncang gay p ny a h

    bn hnk hy ha b pc n pac anag gnanc k

    an cpanc.

    ni Cpanc Hyp a Pb h Chann Can s?

    on h changng hng ab akng a nk a bn

    c n j cng n pc. r b nc hpp n n h cnan .n

    previousLy, our drkit had just sat idLe

    coLLecting dust.jon wiLLiams,

    , bl r

    http://searchstoragechannel.techtarget.com/tip/Backup-window-reduction-methodshttp://searchstoragechannel.techtarget.com/tip/Backup-window-reduction-methodshttp://whatis.techtarget.com/definition/OPEX-operational-expenditurehttp://whatis.techtarget.com/definition/OPEX-operational-expenditurehttp://searchstorage.techtarget.com/feature/What-is-unstructured-data-and-how-is-it-different-from-structured-data-in-the-enterprisehttp://searchstorage.techtarget.com/feature/What-is-unstructured-data-and-how-is-it-different-from-structured-data-in-the-enterprisehttp://searchvirtualdatacentre.techtarget.co.uk/http://www.microscope.co.uk/news/2240159455/Budget-cuts-increasing-security-riskshttp://www.microscope.co.uk/news/2240159455/Budget-cuts-increasing-security-riskshttp://www.microscope.co.uk/news/2240153907/Regulatory-pressures-reveal-poor-risk-management-controlshttp://www.microscope.co.uk/news/2240153907/Regulatory-pressures-reveal-poor-risk-management-controlshttp://www.microscope.co.uk/opinion/Is-compliance-hype-a-problem-the-channel-can-solvehttp://www.microscope.co.uk/opinion/Is-compliance-hype-a-problem-the-channel-can-solvehttp://www.microscope.co.uk/opinion/Is-compliance-hype-a-problem-the-channel-can-solvehttp://www.microscope.co.uk/news/2240153907/Regulatory-pressures-reveal-poor-risk-management-controlshttp://www.microscope.co.uk/news/2240159455/Budget-cuts-increasing-security-riskshttp://searchvirtualdatacentre.techtarget.co.uk/http://searchstorage.techtarget.com/feature/What-is-unstructured-data-and-how-is-it-different-from-structured-data-in-the-enterprisehttp://searchstorage.techtarget.com/feature/What-is-unstructured-data-and-how-is-it-different-from-structured-data-in-the-enterprisehttp://whatis.techtarget.com/definition/OPEX-operational-expenditurehttp://searchstoragechannel.techtarget.com/tip/Backup-window-reduction-methodshttp://searchstoragechannel.techtarget.com/tip/Backup-window-reduction-methods
  • 7/30/2019 IT in Europe_final

    10/19

    IT In EuropE augusT 2012 10

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    dAtA ComPliANCe imPliCAtioNs For dAtA storAGe

    ith the explsi

    data withirgaisatis

    ad the upcmigchages t the EU

    data prtecti regime, busiesseseed t becme mre practive

    abut their data strage strategiesrm a cmpliace pit view.

    T d that, busiesses eed tuderstad the Eurpea datacmpliace regulatis the mustcmpl with ad the implicatis

    r what the must d with data.

    What data storage compliance

    regulations do European IT depart-

    ments ace?

    Data strage regulatis i Eurpeare curretl drive b prvisis the EU Data Prtecti Directivead their respective applicatis i

    member states, b prvisis relat-ig t atial directives arudreteti perids r acial

    irmati ad b ther require-

    mets stemmig ut reedm irmati ramewrks as well aselectric cmmerce, ckie ade-discver requiremets.

    The curret EU data prtectiregime requires rgaisatis t

    take apprpriate securit mea-sures t prtect persal data. It isbased arud eight priciples that

    drive the data prtecti regimewhich dictate hw persal datamust be acquired, maitaied,updated, stred, prtected ad dis-

    psed .Chages t the EU data prtec-

    ti ladscape are drive b theupcmig EU Data Prtecti lawwhich is due ut late this ear rext ear ad will be implemeted

    at atial level b member statesi the subsequet 24 t 36 mths.

    It is alread clear that the EU

    data prtecti rerm icludesar-reachig prpsals that willaect rgaisatis that hld data

    data compLiance impLica-tions for data storageRead the European data compliance regulations you needto comply with and what businesses need to do with data.By Mathieu Gorge

    W

  • 7/30/2019 IT in Europe_final

    11/19

    IT In EuropE augusT 2012 11

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    dAtA ComPliANCe imPliCAtioNs For dAtA storAGe

    idividuals, icludig the bur-geig clud strage sectr.

    The rst thig t te is that the

    regulatr ramewrk is mvigt a sigle regulati r the EU

    ad is trig t keep up with a shiti which mre data is kept i theclud ad therere maaged b athird part ther tha the rigialbusiess that cllected it, tpicallthe data ctrller.

    I data prtecti jarg, this

    meas that the clud prviderbecmes a data prcessr ad itmust prtect the irmati ithadles ad stres behal thedata ctrller. The respsibili-ties data ctrllers are gig t

    be icreased. Thell have t haveplicies ad prcedures i placead will have t demstrate thehave carried ut sta traiig ad

    checked that data prcessrs areals takig apprpriate securit

    measures t prtect persal datapertaiig t custmers, empl-ees ad ctractrs.

    rm a clud perspective, therewill be a right t be rgtte adt data prtabilit, which measthat u are suppsed, as a clud

    prvider, t be able t delete ir-mati abut a pers i the asku t d s but als allw themt mve their data rm e cludprvider t ather.

    There are ther regulatis adparameters t keep i mid:

    nUsig a clud prvider basedutside the EU: Right w the EU

    prvides ver strg prtectir persal data. I data belg-ig t EU busiesses r citizes isstred utside the EU, the tras-

    er that data eeds t be securead data prtecti requiremetsat the ther ed eed t be at

    least as strg as thse i the EU.

    nSme specic sectrs ad/rregis require data t be keptr a lg time. r istace, isme regis acial servicesrgaisatis ma eed t keep

    call recrdigs r tax irmatictaiig persal irmati

    nIdustr stadards such as PCIDSS als prvide additialrequiremets what tpe cardhlder data ma r ma tbe stred ad hw it is t be pr-

    tected.

    What are the key steps in ensuring

    your organisation is compliant withregard to the retention o data?

    Start with a clear data classica-ti scheme. Data classicatiis hw u take data that is beig

    British Airways and the Google Search ApplianceREAD THE ULL SToRy In GERMAn

    http://www.searchcloudcomputing.de/whitepaper/downloads/15817http://www.searchcloudcomputing.de/whitepaper/downloads/15817http://www.searchcloudcomputing.de/whitepaper/downloads/15817
  • 7/30/2019 IT in Europe_final

    12/19

    IT In EuropE augusT 2012 12

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    dAtA ComPliANCe imPliCAtioNs For dAtA storAGe

    used withi ur rgaisati adrgaise it s the right peple haveaccess t the right data at the right

    time.orgaisatis might wat t

    classi data rm a user-basedperspective, rm a securit-basedperspective r rm a peratisperspective, ad the wa u dthis is b esurig the right datais accessible b the right peple

    at the right time. This evetuall

    allws rgaisatis t l strethe right data i the right placewith apprpriate securitad rthe right durati.

    What are the main technologies

    and processes that an IT depart-

    ment can employ or data storage

    compliance?

    The best thig t d is t startrm a high level ad t draw upecsstem diagrams that map utthe dieret sils ad busiessuits withi ur rgaisati adthe wider eterprise. oce uvede that, u ca map the data

    fw withi each the sils adeach the actrs i ur ecss-

    tem. Esure this mappig icludesdevices wed b emplees butwhich ma be strig busiess data.

    rm that arises a data classica-ti scheme which takes ever tpe

    data pertaiig t custmers,users, suppliers, etcad allwsu t appl the right levels pr-tecti, strage ad access.

    This is the cmplemeted b athree-level structured data strageapprach:

    1. Pc an pc. Thesemust adhere t the prvisi alllegal ad idustr regulatis ad

    ramewrks which appl t urrgaisati ad the data it stres,

    trasmits r prcesses.

    2. tchnca n. These caiclude ctet lterig slutisprevetig uauthrised data rmleavig/eterig ur ecsstem,

    data ecrpti tls, data mi-

    ig slutis, access slutis tesure l the right peple have

    access t sesitive data, datamaskig ad data dispsal slu-tis.

    3. u anng. This icludes dataprtecti traiig r prcessrsad ctrllers, techical traiigr IT sta, C-level traiig the

    impact -cmpliace withregards t data strage, busiess

    ctiuit traiig ad testig tesure ur rgaisati is readt address a e-discver requestr implemet the right t be r-gtte ad prtabilit prvisis the upcmig EU regulati

    The abve structure eeds tbe maitaied ad updated a gig basis as regulatisarud data strage keep evlv-ig ad regial diereces appl

    withi the EU. reig laws maals appl t hw ur rgaisatimust prtect data it stres. n

    Mathieu Gorge i the CEo f Viitt,

    contributor to sechste.c.uK and IT

    in Europe.

    http://searchstorage.techtarget.co.uk/http://searchstorage.techtarget.co.uk/
  • 7/30/2019 IT in Europe_final

    13/19

    IT In EuropE augusT 2012 13

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    uNiFied storAGe Goes mAiNstreAm

    wi-Fi

    are shared privatebroadband connec-tions the futureof wi-fi on the go?We analyse the growing trend of

    software opening up home routers

    for public Wi-Fi consumption.

    By Jennifer Scott

    puBlic wi-fi is begiig t d its

    wa it ever crer the UK.It is lger the dmai theAmerica-stle cee shp, withpubs, retailers ad eve theme

    parks erig their w cec-tis.

    Hwever, this is t eugh rthe data-hugr devices i mstpeples pckets, ad bth c-

    sumers ad busiess users arelkig r cectis themve, t just ver a espress.

    Techlg has w bee devel-

    ped t take advatage exist-ig residetial Wi-i cectis,eablig custmers siged up r

    hme bradbad deals with theiriteret service prvider (ISP)t use ther custmers ruterst cect t the iteret themve.

    I the UK, BT has its erig,i race there are similar dealsavailable rm three prviders, ad

    w a Swedish rm called Anetwrks is testig its w st-ware t eable the prcess withuthavig t sig i thrugh a Webprtal each time u wat t c-

    ect t a dieret etwrk.The idea makes sese. As A

    sas its website, wh ivest bil-lis dllars i beeg up cellu-

    lar etwrks r mbile data whethere are Wi-i etwrks with ple-t spare capacit everwhere?Hwever, t evere is s kee.

    what aBout security?

    irstl, there is the securit aspect.We te hear hrrr stries

    what ca happe t persal datai u dt prtect ur Wi-icecti, but b sigig up t a

    more european contentfrom the techtargetnetwork

    http://www.computerweekly.com/news/2240083274/BT-and-FON-aim-for-largest-online-Wi-Fi-communityhttp://www.computerweekly.com/news/2240159156/Anyfi-Networks-targets-existing-Wi-Fi-for-public-usehttp://www.computerweekly.com/news/2240159156/Anyfi-Networks-targets-existing-Wi-Fi-for-public-usehttp://www.computerweekly.com/news/2240159156/Anyfi-Networks-targets-existing-Wi-Fi-for-public-usehttp://www.computerweekly.com/news/2240159156/Anyfi-Networks-targets-existing-Wi-Fi-for-public-usehttp://www.computerweekly.com/news/2240083274/BT-and-FON-aim-for-largest-online-Wi-Fi-community
  • 7/30/2019 IT in Europe_final

    14/19

    IT In EuropE augusT 2012 14

    uNiFied storAGe Goes mAiNstreAm

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    service like this, it ma eel like uare thrwig pe ur drs tprspective cbercrimials.

    Hwever, all the rms erigthese services claim securit is

    their umber e pririt ad theg t great measures t keep userssae.

    A said its stware creates avirtual access prt t keep visitrsawa rm the hme cecti

    etirel. The sluti als rutes

    the custmer back t make itsdevice thik it is its hme Wi-ietwrk. As a result, it puts thesame securit measures i place asthe custmer uses at hme, esur-ig mbiles ad tablets are prtect-

    ed rm isecure Wi-i.Likewise, whe a BT user shares

    their cecti, it is ver a sepa-rate chael ad des t mix the

    exteral user with the hme cus-tmer, accrdig t the telc.

    what aBout performance?

    I securit is t a issue, whatabut perrmace? Surel passig a prti ur badwidth tthe public is gig t damage ur

    experiece the Web?Agai, hwever, thse behid

    the techlg sa . Bth BTad A said the priritise adata requests cmig rm thehme evirmet, with the rmerclaimig it is such a small amut

    badwidth that eect wuldbe elt b the user paig r the

    service awa.o curse, i s little badwidth

    is beig siphed , there are

    questis hw reliable the pr-table cectis will be as well.

    But r smee passig hmes ibusiess hurs ad checkig theirce email whe mst are ut at

    wrk, there shuld t be t mabarriers t perrmace.

    you shall have wi-fi

    wherever you go

    What will wi peple rud rmall these issues is the ease use. The prspect havig Wi-iwherever u g withi As

    casea seamless trasitibetwee etwrks, will appeal

    t the scial etwrk-reziedcsumer as much as the wrk-email-bsessed pressial

    the g.Bjr Smedma, CEo A

    netwrks, said that Eurpe wasmuch mre psitive abut the

    trade-, s the rll-ut ad adp-ti culd be much aster urshres.

    Its a little t d with culture,he said. The securit the

    prduct is perect, but the ps-chlg the sluti culd beimprved.

    Sme peple act istictivel,

    t sa the d t wat t use thistpe sluti, but we are mrepe t it i the EU perhaps.

    what wiLL winpeopLe round from

    aLL of these issuesis the ease of use.

  • 7/30/2019 IT in Europe_final

    15/19

    IT In EuropE augusT 2012 15

    rurAl BroAdBANdsHould resideNts PAY?

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    keep paying BroadBand

    customers happy

    The ke is i implemetati. BT

    aced a backlash rm custmerswhe Computer Weeklydiscv-ered it was autmaticall ptigusers it , with l ver tismallprit detailig the service ada lg lie URLs ad websitesearches required t d ut hw

    t tur it .

    other ISPs ad mbile pera-trs shuld lear rm this less

    ad be pe with their custmers.The cversati ma begi withthe psitives that peig up urWi-i ca brig, but the must ll

    i all the blaks s custmers arehapp ad aware what the are

    sigig up r.I this rule is llwed ad the

    techlgies ctiue t get easiert use, this culd well be the path all uture public Wi-i where it

    is better t share. n

    Jennifer Scott is the networking editor

    for Computer Weeklyand a contributor

    to IT in Europe.

    dAtA mANAGemeNt

    data virtuaLisation

    on the rise as etLaLternative fordata integrationThe Phone House and Novartis have

    turned to data virtualisation from

    Denodo and Composite to gain a single

    logical view of disparate data sources.

    By Gareth Morgan

    data virtualisation is emergig as apssible techique r busiessest use i tig tgether disparatedatabases t becme mre agile ibth their busiess peratis adtheir data itegrati prcesses.

    Traditiall, cmpaies haverelied data itegrati techl-gies, such as extract, trasrm ad

    lad (ETL) tls, t pull data rmtrasactial sstems ad ppulatedata warehuses r busiess itel-ligece (BI) ad aaltics uses. Butr applicatis that require real- r

    ear-real-time decisi makig,gettig critical busiess isight ut a ETL-ed data warehuse caseem as eective as sedig Lewis

    Hamilt ut t quali r a GradPrix i a Ala Rme Series 1 Spi-der. The icic 1960s radster is alvel machie, but e thats likelt all ar shrt rmula oesucmprmisig eed r speed.

    Ather challege r ETL pr-cesses is the icreasigl largeumber data surces that rga-

    isatis are lkig t tap. Suchpressures are ecapsulated b thepharmaceutical idustr. Ever

    isps and mobiLeoperators shouLdbe open with theircustomers. the con-versation may beginwith the positivesthat opening upyour wi-fi can bring.

    http://www.computerweekly.com/news/2240150917/BT-helps-itself-to-Home-Hubs-for-public-Wi-Fihttp://www.computerweekly.com/news/2240150917/BT-helps-itself-to-Home-Hubs-for-public-Wi-Fihttp://www.computerweekly.com/news/2240150917/BT-helps-itself-to-Home-Hubs-for-public-Wi-Fihttp://www.computerweekly.com/news/2240150917/BT-helps-itself-to-Home-Hubs-for-public-Wi-Fihttp://www.computerweekly.com/news/2240150917/BT-helps-itself-to-Home-Hubs-for-public-Wi-Fihttp://www.computerweekly.com/news/2240150917/BT-helps-itself-to-Home-Hubs-for-public-Wi-Fihttp://www.computerweekly.com/http://www.computerweekly.com/http://www.computerweekly.com/news/2240150917/BT-helps-itself-to-Home-Hubs-for-public-Wi-Fihttp://www.computerweekly.com/news/2240150917/BT-helps-itself-to-Home-Hubs-for-public-Wi-Fihttp://www.computerweekly.com/news/2240150917/BT-helps-itself-to-Home-Hubs-for-public-Wi-Fi
  • 7/30/2019 IT in Europe_final

    16/19

    IT In EuropE augusT 2012 16

    rurAl BroAdBANdsHould resideNts PAY?

    ear, billis puds are puredit research ad develpmeterts, with cmpaies hugerig

    t create ew ad imprved drugsthat ca prvide bster shts t

    their busiesses. Data is the lie-bld pharmaceutical makersad there is dearth it r themt aalse.

    As atma oezdemir-Zaech, akwledge egieerig csultatat Switzerlad-based nvartis

    Pharma, explaied, her IT teamserves a research departmet that

    eeds t pull data rm a huge vari-et surces. That ma icludetrves trial research rm medi-

    cal publishers r cmmercial datasurces, alg with a abudace data rm iteral sstems. ourteam has extesive experiece ad

    skills i usig ETL, ad there areprcedures that ca be de i a

    semi-autmus wa, said oez-demir-Zaech. But the mre datasurces we used, the mre time it

    was takig t get the data i thermat we wat.

    Traditial data warehuseshavet becme redudat, said

    Gar Baverstck, UK regial direc-tr at data virtualisati vedrDed Techlgies. But as the

    pressure r real-time isight adicreased busiess agilit ite-sies, ad cmpaies icreas-

    igl lk t utilise exteral datasurces, ma IT chies are seekig

    alterative was t deliver data tbusiess users.

    data virtualisation

    keeps data in its place

    oe pti is data virtualisati,

    which prvides a laer abstrac-ti that ca sit atp eterpriseapplicatis, data warehuses,trasacti databases, Web prtalsad ther data surces, eabligcmpaies t pull tgether datarm dieret sstems withut

    havig t create ad stre ewcpies the irmati. Thatelimiates the eed t replicate

    data r mve it rm surce ss-tems, reducig IT wrklads aswell as the risk itrducig dataerrrs.

    The techlg als supprts thewritig trasacti data updates

    back t the surce sstems. This,prpets sa, is e the clearbeets that set data virtualisa-

    ti apart rm data ederati adeterprise irmati itegrati(EII), tw earlier techiques withsimilar aims makig it easier taalse data rm a disparate arra surces.

    While the three share smecapabilities ad are smetimesviewed as the same thig uder

    dieret ames, EII techlgered a read-l apprach tdata querig ad reprtig, said

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    data is the LifebLood

    of pharmaceuticaLmakersand thereis no dearth of itfor them to anaLyse.

    http://searchdatamanagement.techtarget.com/news/2240147012/Big-data-yes-but-enterprise-data-warehouse-not-dead-yethttp://searchdatamanagement.techtarget.com/news/2240147012/Big-data-yes-but-enterprise-data-warehouse-not-dead-yethttp://searchdatamanagement.techtarget.com/definition/data-federation-technologyhttp://searchdatamanagement.techtarget.com/tip/Enterprise-information-integration-EII-delivers-information-on-demandhttp://searchdatamanagement.techtarget.com/tip/Enterprise-information-integration-EII-delivers-information-on-demandhttp://searchdatamanagement.techtarget.com/definition/data-federation-technologyhttp://searchdatamanagement.techtarget.com/news/2240147012/Big-data-yes-but-enterprise-data-warehouse-not-dead-yethttp://searchdatamanagement.techtarget.com/news/2240147012/Big-data-yes-but-enterprise-data-warehouse-not-dead-yet
  • 7/30/2019 IT in Europe_final

    17/19

    IT In EuropE augusT 2012 17

    rurAl BroAdBANdsHould resideNts PAY?

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    Bria Hpkis, a US-based aalstwith rrester Research.

    Data ederati emerged mre

    tha a decade ag ad was meatt d awa with ETL tls, data

    stagig areas ad the eed t cre-ate ew data marts. But criticssa its iitial prmise masked keweakesses: Data ederati st-

    ware was ill-suited t ver largedata sets r evirmets requir-ig cmplex data trasrmatis.

    Wrse still, it was, i the mids ma, itimatel liked t the

    wrld service-rieted architec-ture (SoA).

    There were a lt gd thigsassciated with SoA, such as theerts t drive cmplexit rm

    rgaisatis IT irastructure,break dw the irmati silsad utagle the spaghetti diagram

    IT architecture, said Baverstck.But as the ecmic wids shited,

    these tremedusl cmplex ITprjects ell ut avur, as busi-esses cused thse erts

    that wuld brig quick wis.

    retailer looks to

    drive out data errors

    The Phe Husethe tradigame r the Eurpea peratis UK-based mbile phe retailchai Carphe Warehuseimplemeted Deds data vir-tualisati techlg betwee itsSpaish subsidiars trasactialsstems ad the Web-based ss-

    tems mbile peratrs because the dual read-ad-write capa-bilit supprted b the tls, said

    David Garcia Herad, busiessexchage maager r The PheHuse Spai.

    The retailer acts as a itermedi-ar betwee its custmers ad thembile peratrs. But, Heradsaid, Phe Huses sales sta had

    t eter custmer data it thecmpas iteral sstems adthe reke it it the mbile pera-

    trs sstems because the dieretapplicatis culd t talk t eachther.

    Wheever u have maualdata etr, ure gig t createerrrs, said Herad. Wed have

    custmer recrds that didt matchthse held b the peratrs, adthat was cstig us me.

    Ad with apprximatel 1.5 mil-li trasactis prcessed eachear i Spai, cuttig the data etrtime i hal was a huge prductivitb r the retailers sales teams.

    While there were simpler was

    t achieve the itegrati, Hera-d kew that the data virtualisatitls culd prvide ther beets

    t. our ivicig sstem adCRM sstems are prett gd,but there 20 ears ld, s it ca

    whenever youhave manuaL dataentry, youre goingto create errors.david garcia hernando,

    x ,

    t p h s

  • 7/30/2019 IT in Europe_final

    18/19

    IT In EuropE augusT 2012 18

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    rurAl BroAdBANdsHould resideNts PAY?

    be tugh whe u wat t itr-duce ew thigs quickl, he said.But thaks t the Ded tech-

    lg, we ca create ew reprtswated b the busiess reall

    quickl.Phe Huses data virtualisa-

    ti experiece is tpical ma the implemetatis rrester

    sees. Mst rgaisatis get itdata virtualisati r tactical rea-ss, but ce thats de the d

    that the beets t havig tphsicall mve the data arud

    r itegrati has much wider usecases, said Hpkis.

    data virtualisation: no limits?

    Its a similar tale at nvartis, whichimplemeted a data virtualisatitl rm Cmpsite Stware t

    eable its researchers t quicklcmbie data rm bth iteralad exteral surces it a search-able virtual data stre. our par-ticular challege was takig vast

    clum-based bilgical data setsrm exteral surces ad itegrat-ig that with ur w oracle data-base, said oezdemir-Zaech. But

    Cmpsite built us a pr c-cept withi three das. oce wewere able t get eas access t allthse data surces, the idea realltk hld.

    She added that with data virtuali-sati, there are limitatisitdest matter whether the datasets were huge r ti. r us,

    thats reall imprtat.Hithert, rgaisatis ma

    have bee tempted t make their

    data easier t maage b uderg-ig a database cslidati pr-gramme. That has sme bvius

    advatages, Hpkis said. But itis a massive udertakig, he said.

    Its hard eugh r structureddata, ever mid the mrass ustructured data swirlig arudthe eterprise. Data virtualisatiprmises t deliver sme thesame beetsmst bviusl,

    the ease aalsig datawith-

    ut the burde massive data adapplicati itegrati.

    Such beets, cmbied with thebelie that tactical data virtualisa-ti prjects will give rise t mrestrategic prgrammes desiged t

    treat data as a utilit-like service,lead rrester t predict that thedemad r data virtualisati isset t bm. It aticipates that

    rgaisatis will sped $8 bil-li glball data virtualisatiliceces, maiteace ad servicesb 2014.

    Still, eve data virtualisativedrs ackwledge that the

    techlg ist the aswer t alldata itegrati questis. Datavirtualisati is t the apgee

    irmati maagemet thatmeas u ca d awa with allthe ther tls uve relied

    ver the ears, said Ash Parikh,directr prduct maagemet atIrmatica. Its like a Swiss Armkiethis is just e the tlst get the jb de.n

    Gareth Morgan is a freelance technology

    journalist and a contributor to sechDt-

    Memet.c.k and IT in Europe.

    http://searchdatamanagement.techtarget.com/definition/columnar-databasehttp://searchdatamanagement.techtarget.co.uk/http://searchdatamanagement.techtarget.co.uk/http://searchdatamanagement.techtarget.co.uk/http://searchdatamanagement.techtarget.co.uk/http://searchdatamanagement.techtarget.co.uk/http://searchdatamanagement.techtarget.com/definition/columnar-database
  • 7/30/2019 IT in Europe_final

    19/19

    home

    editors

    Letter

    data protection

    framework:

    a cisos

    perspective

    infrastructure

    overhauL

    data

    compLiance

    impLications for

    data storage

    are shared pri-

    vate broadband

    connections

    the future of

    wi-fi on the go?

    data

    virtuaLisation

    on rise as etLaLternative

    for data

    integration

    additionaL

    european

    resources

    additionaLresources

    nnext Geerati

    irewalls: Learig GuideIT i Healthcare

    nEssetial Guide: EU Data

    Prtecti Regulati

    nHw t CmplWith the EU Ckie Law

    nCW500: The uture Stware Develpmet

    nLd 2012 olmpicGames Cverage

    nSupplier Prle: IBM

    nCW500: Maagig

    Scial Media

    nA Begiers Guidet Virtualisati

    nCW500: Data CetreTrasrmati

    IT In Europe E-zine is a TechTarget e-publicati.

    Ctributrs iclude:

    SearchSecurit.c.UK,

    SearchVirtualDataCetre.c.UK,

    SearchStrage.c.UK,

    SearchDataMaagemet.c.UK,

    Searchnetwrkig.c.UK,

    CmputerWeekl.cm ad Micrscpe.c.uk.

    Cahn Gagn

    Editrial Directr

    Kaygh Baan

    Special Prjects Editr

    Chn Caa

    Maagig Editr

    lna Ky

    Directr olie Desig

    tchtag

    3-4a Little Prtlad Street, 1st lr

    Ld W1W 7JB

    www.techtarget.cm

    tchtag

    275 Grve Street, newt, MA 02466www.techtarget.cm

    2012 TechTarget Ic. n part this publicati

    ma be trasmitted r reprduced i a rm r

    b a meas withut writte permissi rm the

    publisher. TechTarget reprits are available thrugh

    The yGS Grup.

    About TechTarget:TechTarget publishes media for

    information technology professionals. More than 100

    focused websites enable quick access to a deep store

    of news, advice and analysis about the technologies,

    products and processes crucial to your job. Our live

    and virtual events give you direct access to indepen-dent expert commentary and advice. At IT Knowledge

    Exchange, our social community, you can get advice

    and share solutions with peers and experts.

    AdditioNAl resourCes

    http://www.computerweekly.com/guides/Next-Generation-Firewalls-Learning-Guidehttp://www.computerweekly.com/guides/Next-Generation-Firewalls-Learning-Guidehttp://www.computerweekly.com/guides/IT-in-Healthcarehttp://www.computerweekly.com/guides/Essential-guide-What-the-EU-Data-Protection-Regulation-changes-mean-to-youhttp://www.computerweekly.com/guides/Essential-guide-What-the-EU-Data-Protection-Regulation-changes-mean-to-youhttp://www.computerweekly.com/guides/How-to-comply-with-the-EU-cookie-lawhttp://www.computerweekly.com/guides/How-to-comply-with-the-EU-cookie-lawhttp://www.computerweekly.com/guides/CW500-The-future-of-software-developmenthttp://www.computerweekly.com/guides/CW500-The-future-of-software-developmenthttp://www.computerweekly.com/guides/100-Days-to-go-to-the-2012-London-Olympicshttp://www.computerweekly.com/guides/100-Days-to-go-to-the-2012-London-Olympicshttp://www.computerweekly.com/guides/Supplier-profile-IBMhttp://www.computerweekly.com/guides/CW500-Managing-social-mediahttp://www.computerweekly.com/guides/CW500-Managing-social-mediahttp://www.computerweekly.com/guides/A-beginners-guide-to-virtualisationhttp://www.computerweekly.com/guides/A-beginners-guide-to-virtualisationhttp://www.computerweekly.com/guides/CW500-Datacentre-transformationhttp://www.computerweekly.com/guides/CW500-Datacentre-transformationhttp://www.computerweekly.com/http://www.microscope.co.uk/http://www.techtarget.com/http://www.techtarget.com/http://reprints.ygsgroup.com/m/techtargethttp://reprints.ygsgroup.com/m/techtargethttp://www.techtarget.com/http://www.techtarget.com/http://www.microscope.co.uk/http://www.computerweekly.com/http://www.computerweekly.com/guides/CW500-Datacentre-transformationhttp://www.computerweekly.com/guides/CW500-Datacentre-transformationhttp://www.computerweekly.com/guides/A-beginners-guide-to-virtualisationhttp://www.computerweekly.com/guides/A-beginners-guide-to-virtualisationhttp://www.computerweekly.com/guides/CW500-Managing-social-mediahttp://www.computerweekly.com/guides/CW500-Managing-social-mediahttp://www.computerweekly.com/guides/Supplier-profile-IBMhttp://www.computerweekly.com/guides/100-Days-to-go-to-the-2012-London-Olympicshttp://www.computerweekly.com/guides/100-Days-to-go-to-the-2012-London-Olympicshttp://www.computerweekly.com/guides/CW500-The-future-of-software-developmenthttp://www.computerweekly.com/guides/CW500-The-future-of-software-developmenthttp://www.computerweekly.com/guides/How-to-comply-with-the-EU-cookie-lawhttp://www.computerweekly.com/guides/How-to-comply-with-the-EU-cookie-lawhttp://www.computerweekly.com/guides/Essential-guide-What-the-EU-Data-Protection-Regulation-changes-mean-to-youhttp://www.computerweekly.com/guides/Essential-guide-What-the-EU-Data-Protection-Regulation-changes-mean-to-youhttp://www.computerweekly.com/guides/IT-in-Healthcarehttp://www.computerweekly.com/guides/Next-Generation-Firewalls-Learning-Guidehttp://www.computerweekly.com/guides/Next-Generation-Firewalls-Learning-Guide