- Budgeting, Planning & Forecasting
- Enterprise Accounting Software
- Financial Management Solutions
- Small and Medium Sized Business Accounting Software
- Treasury, Cash and Risk Management
- Business Activity Monitoring (BAM)
- Business Intelligence Software
- Business Process Management (BPM)
- Enterprise Performance Management
- Reporting and End-User Query Tools
- RFID-- Radio Frequency Identification
- Warehouse Management Software
- Customer Experience Management (CEM)
- Customer Information Management
- Sales and Marketing Software
- Enterprise Asset Management (EAM)
- Facilities Management and Maintenance
- Electronic Medical Billing Systems
- Healthcare Inventory Management
- Employee Benefits Administration
- Employee Relationship Management (ERM)
- Human Resources and Payroll Software
- Learning Management Systems (LMS)
- Workforce Planning and Management
- Enterprise Content Management
- Information Lifecycle Management
- Advanced Planning and Scheduling
- Integrated Manufacturing Solutions
- Manufacturing Enterprise Resource Planning (MERP)
- Product Life Cycle Management (PLM)
- Project Management Solutions
- Resource Planning and Scheduling
- Web, Video and Audio Conferencing
- Data Center Power Management
- Software-Defined Data Center (SDDC)
- Cloud Computing Applications
- Database Planning and Implementation
- Enterprise Application Integration
- Enterprise Application Integration Middleware
- Service Oriented Architecture (SOA)
- Business Service Management (BSM)
- Business Technology Optimization
- Enterprise Architecture Management (EAM)
- Enterprise Resource Management
- Enterprise Resource Planning (ERP)
- Information Technology Infrastructure Library (ITIL)
- IT Service Management (ITSM)
- Project Portfolio Management (PPM)
- Technology Planning and Analysis
- BYOD (Bring Your Own Device)
- Managed Service Provider (MSP)
- Network Configuration Management Software
- Fraud Detection & Prevention
- Intrusion Detection and Prevention
- IT Security Frameworks and Standards
- Threat and Vulnerability Management
- Virtual Private Network Security
- Data Center & Storage Solutions
- Network Attached Storage (NAS)
- Remote and Offsite Data Storage
- SAN Virtualization and Consolidation
- Application Lifecycle Management (ALM)
- Application Performance Management (APM)
- Enterprise Systems Management
- Software as a Service (SaaS)
- Software Configuration Management (SCM)
- Natural Language Processing (NLP)
- Electronic Catalog Management
- Electronic Commerce Interchange (EDI-XML)
Posted by Phil Muncaster
China’s new Cybersecurity Law (CSL) might have been a long-time coming, but it’s all set to have a major impact on the way foreign firms do business in the Middle Kingdom. This being China, however, nothing is quite as it first appears. A law ostensibly created to bring China into line with global best practices on cybersecurity could end up having the opposite effect if the government decides to ask for IP, source code and other details as part of ‘national security’ spot-checks.
It could even run the risk of many such firms being shunned in the West and raise concerns that Chinese agents are stockpiling exploits in their products and systems.
The Cyberspace Security Law of the People's Republic of China, to give it its full title, finally came into force in June this year. On paper, it contains some important best practice provisions for “network operators” to prevent data leaks and breaches and any damage or unauthorised access. These are neatly summarised by the China Law Blog as:
There are also some important new stipulations designed to protect consumer data, some of which overlap with the new EU GDPR:
You're using a web browser that our registration forms don't support yet.
Please use one of these options.
PREVIOUS ARTICLE
« Ignorant botnets: Don't become a 'victim' attackerPhil Muncaster has been writing about technology since joining IT Week as a reporter in 2005. After leaving his post as news editor of online site V3 in 2012, Phil spent over two years covering the Asian tech scene from his base in Hong Kong. Now back in London, he always has one eye on what's happening out East.
Martin Veitch's inside track on today’s tech trends
Keri Allan looks at the latest trends and technologies
Trevor Clawson on the outlook for UK Tech startups
Do you think your smartphone is making you a workaholic?
Do you think your smartphone is making you a workaholic?
Yes
No
I'm working on keeping a work-life balance