How to build cybersecurity into outsourcing contracts
Any time a company shares data or provides access to third-parties, it increases its vulnerability to unauthorized access or breach. So in today’s IT environment in which enterprises partner with multiple IT service providers, who in turn may have multiple subcontracters, cyber risks increase exponentially.[ Related: Why CIOs can’t wait to renegotiate their outsourcing contracts ]“Customer data and systems are only as secure as the weakest link in the vendor ecosystem,” says Paul Roy, a partner in the business and technology sourcing practice of Mayer Brown. “The risks for customers are twofold: not only does the customer increase its risk of a data breach, it also increases the risk that it will be in breach of its regulatory or contractual obligations if its vendors fail to comply with such obligations.”To read this article in full or to leave a comment, please click here(Insider Story)
Learn how to provide a foundation for what is shaping up to be one of the hottest NFV use cases for 2016: virtual CPE.
NodePrime is to be integrated into the HDS 8000.