Manufacturing Security Part 2: Lessons from the Financial Services Industry
Manufacturing Security Part 2: Lessons from the Financial Services Industry

The financial services industry is known for tight security. In spite of being an extremely attractive target for hackers, the industry accounted for only 12% of the total breaches worldwide, according to the 2014 Breach Level Index. Another study by […]

Southern California ASUG Winter Chapter Meeting – Symmetry to Attend and Present
Southern California ASUG Winter Chapter Meeting – Symmetry to Attend and Present

The Symmetry team and I are very excited to be attending the Southern California ASUG Winter Chapter Meeting next Wednesday, December 9th at the LA County Zoo, from 9:15am-5:00pm.   Get Informed. Get Educated. Be Empowered. America’s SAP® User Group […]

Planning Disaster Recovery with RTO and RPO
Planning Disaster Recovery with RTO and RPO

Disaster recovery is more than a backup of your data; it’s a complete plan to get your computer systems up and running again in an emergency. Between SAP HANA® and other enterprise software, business productivity applications, customer-facing websites and hardware, […]

Manufacturing Security: 3 Things You Can Do to Keep Your Data Safe
Manufacturing Security: 3 Things You Can Do to Keep Your Data Safe

Manufacturing security faces some unique threats. Unlike other industries, manufacturers depend on PLCs and other electronic systems to control production, and those systems can be vulnerable to hacking. Nonetheless, most hackers use the same tricks they use in other industries […]

Hosting an SAP HANA® Migration
Hosting an SAP HANA® Migration

An SAP HANA® migration requires some tough choices. Should your company keep its ERP hosting onsite, or move to the SAP cloud? Is it more cost effective to manage your core applications internally, or work with a managed services provider? […]

What Does 21 CFR Part 11 Compliance Have to do With Data Centers?
What Does 21 CFR Part 11 Compliance Have to do With Data Centers?

21 CFR Part 11 compliance has been somewhat of an ongoing debate than a set of rules. What isn’t debatable, however, is the reasoning behind 21 CFR Part 11 compliance. These rules are there to insure the integrity of electronic […]

What HIPAA Compliant Hosting Doesn’t Mean
What HIPAA Compliant Hosting Doesn’t Mean

Are you worried about HIPAA compliance? Good. If healthcare behemoths can’t lock down their data, there’s a good chance your organization’s data is in danger as well. Like them, you could probably do better — but you’re not entirely to […]

Next Generation Enterprise Cloud Disaster Recovery
Next Generation Enterprise Cloud Disaster Recovery

No one likes to spend money on resources they aren’t using — especially if the benefit of those resources can’t be immediately felt. As a result, many businesses use inadequate cold disaster recovery systems, sacrificing safety to save cost.   […]

Running SAP HANA®? What You Need to Know from a SAP Basis Perspective.
Running SAP HANA®? What You Need to Know from a SAP Basis Perspective.

SAP HANA® is becoming a reality for many SAP customers. As a Basis Administrator, DBA, or System Architect, you may be asking yourself what that will mean for you. What are the key decision points during the planning phases that will require […]

The Dangers of Stolen Portable Devices and the Security Threats that Lurk Beneath
The Dangers of Stolen Portable Devices and the Security Threats that Lurk Beneath

One of the most overlooked security vulnerabilities by end users of technology today is the physical security of portable devices. Especially those issued to you by your company, these include laptops, phones, tablets, etc.   86% of IT security […]

1 14 15 16 17 18 20