Inside the Briefcase


IT Briefcase Exclusive Interview with Napatech: What the Third Platform Requires of the Network

IT Briefcase Exclusive Interview with Napatech: What the Third Platform Requires of the Network

Daniel Joseph Barry, Napatech
In this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.
Read More >>>





Briefcase Highlights


CLOUD DATA

Staying Secure in the Cloud

August 11, 2015 No Comments

This white paper examines security considerations for migrating communication solutions into the cloud.

Hiding in the Cloud

August 4, 2015 No Comments

Researchers have detected Russian hackers operating in plain sight using the cover of legitimate services including Twitter, Github and cloud storage services to steal data from organizations during the work day. Recently, a cyber gang known as APT29 created malware called Hammertoss which is very hard to detect. Using a variety of Twitter handles daily, they are able to send commands to infected machines using images embedded with encrypted command information, these commands allow them to upload the stolen information to cloud storage services. They also infect legitimate web servers and usethem as part of their command and control infrastructure.

Bring the Nook Home with Reading Apps for iPad

August 4, 2015 No Comments

It is no secret that the nook is now the preferred eReader, even surpassing the Kindle Fire in sales. The problem, however, is that the iPad is still the most popular tablet out there. Once users purchase an iPad they find very little use for their Android-powered Nook, regardless of how great it might be. After all, who wants to carry TWO tablets around? Not many people would answer yes, and for a time, it looked as if Apple might begin to dominate the e-book market.

4 Steps to Protect Your Computer from Data Loss

August 4, 2015 No Comments

Perhaps the most valuable thing about your computer is the data and files that you have saved on it. After all, the main reason for having your PC or laptop is in order to store the data that is on it, and it’s the main priority for putting a protective strategy in place, such as anti-virus software. Whilst operating systems and downloadable software can always be re-downloaded or re-installed, unique, user created data has the potential to be lost forever. Let’s look at some simple steps that can be taken in order to protect your computer or laptop from data loss.

Prevent Hurricane Fear From Churning Up Stormy Clouds

August 3, 2015 No Comments

On July 8, the New York Stock Exchange abruptly came to a screeching halt, United Airlines grounded its flights, and the Wall Street Journal’s website went dark. You might think cloud providers let out sighs of relief when it was determined the cloud had nothing to do with these disruptions. In fact, it was quickly determined that no security breaches or attacks were involved. They were all just coincidental glitches.

IT Briefcase Exclusive Interview: BYOD Planning with an Eye for the Future

July 30, 2015 No Comments

with Israel Lifshitz, NuboIf you’ve been tracking the evolution of our BYOD work culture, you’ll know that most enterprises are at some stage of getting a grip on a myriad of issues, including employee adoption, compliance, Shadow IT and user privacy just to name a few. Read More >>>

Will Windows 10 bring revival to its mobile platform?

July 29, 2015 No Comments

With the release of Windows 10 comes another opportunity for Microsoft to align its direction for mobile to better serve developers and IT departments. Together with a subtle name change to Windows 10 Mobile, Microsoft is looking to draw a line in the sand on its failed attempt to chase Apple in the consumer market with Windows Phone.

The Internet of Things: Challenges and Opportunities Across Industries

July 28, 2015 No Comments

with Sam Ganga, DMIZK Research reports that the Internet of Things (IoT) will have 50 billion endpoints by 2010 and will create 2.5 trillion new revenue streams in the next 10 years. That represents a huge opportunity for organizations large and small across all industries. Read More >>>

Capturing Packets Faster in the 100Gbps World

July 27, 2015 No Comments

by Daniel Joseph Barry, NapatechThe number of network end points is growing into the billions as the Internet of Things (IoT) expands its presence, spurred on inexpensive sensors, the rapid adoption of mobile devices and innovative minds. This presents engineers and administrators with the challenge of managing and protecting the network in real time. Read More >>>

Requirements Customers Have For Mobile Payments

July 22, 2015 No Comments

by Kristen Gramigna, BluePayMobile payments can equip small businesses to accept payment by credit or debit card, using the mobile device that small-business owners likely have within reach most of the time. While mobile payment technology can benefit both customer and business owner, some customers remain hesitant about them. Read More >>>

Establishing a Foundation for Enterprise Security Policy in the Public Cloud

July 9, 2015 No Comments

In many respects, Cloud Access Security Brokers are the future of what we currently know as the data center firewall. How so? A data center firewall sits in front of enterprise applications/databases (systems of record) in the data center, providing control and visibility. Increasingly, those applications and databases are moving from the corporate data center to the public cloud – with apps like Office 365, Box, and Salesforce, quickly becoming the norm in the enterprise. In this context, cloud apps become the new system of record. Since the traditional data center firewall can’t see cloud traffic, it can no longer provide the protection that we need.

Migrating to the Cloud? Pave the Way For Dynamic Infrastructure With Effective Planning

July 8, 2015 No Comments

Cloud migration remains a challenge for businesses. According to a June 9th article from Cloud Pro, reporting on a recent Cloud Industry Forum study, just 10 percent of all senior IT professionals asked said their migration “could not have been improved.” The sheer complexity of moving to the cloud proved troublesome for 38 percent of respondents, and 30 percent had issues with data sovereignty.

Top 5 Cloud Computing Solutions For Small Business

June 29, 2015 No Comments

Cloud computing solutions can add tremendous value to your small business. Many times disaster strikes when devices are lost during travel or servers go down. It is difficult to gauge whether or not you will be able to access or recover your company data under such circumstances. Whether you’ve just spilled a morning coffee or lost your work tablet all together, cloud computing solutions will always have your data stored and accessible 24/7. Cloud services can be seen as external hard drives that do not require hardware.

Elevate Your Business with the Cloud

June 29, 2015 No Comments

The cloud isn’t just a buzzword for the boardroom – it’s the metaphor used to describe the vast array of connected services that are changing the way businesses work. It’s a metaphor that’s driving a revolution, and if you haven’t included cloud-based services in your business model yet, you’ve already got some catching up to do.

Your Mobile Wallet Isn’t Safe

June 29, 2015 No Comments

with Dror Nadler, CellroxAs mobile payments barrel forward like a freight train, the potential consequences of cyber breaches grow in severity. 30 percent of U.S. shoppers already use mobile wallets, and 62 percent of shoppers who don’t use a mobile wallet expect to adopt one in the next year, according to a 2015 report from Interactions marketing group. Read More >>>

Benefits of using the private cloud in the public sector: Why sensitive data should never be stored on a personal server

June 23, 2015 No Comments

Whether an enterprise or government entity, the proliferation of BYOD has propelled data security to the forefront of just about any organization with a digital footprint. This is of particular concern to public sector IT where security and reliability are critical for managing and safeguarding sensitive data. The problem is compounded when you factor in the tendency of employees to cross-contaminate their devices with both personal and work-specific communications. As such, sensitive data should never be stored on a personal server, which can be more easily breached.

U.S. Open Primer: In the Cloud or on the Golf Course, Hazards Can Be Devastating

June 22, 2015 No Comments

This week, the U.S. Open heads to the Pacific Northwest for the very first time. Chambers Bay Golf Course in Washington State will play host. Anyone familiar with this course knows “there aren’t traditional golf hazards, like water and trees, but there is trouble everywhere at Chambers Bay” says one sports blogger.

How To Drive Success In The Cloud: Secrets To Boosting Adoption

June 18, 2015 No Comments

Cultivating employee buy-in is a prime concern of managers any time a new tool or process is implemented. The more resistance an initiative faces, the more likely it is to ultimately fail.The path to increased efficiency isn’t always smooth, often requiring nudges to help people get out of their comfort zones and move forward.

Corporate Cloud Computing Trends Survey Results

June 11, 2015 No Comments

A March survey of 1,593 members of the 451 Global Digital Infrastructure Alliance looked at cloud computing and other key IT market trends, including enterprise adoption of cloud, IT budgets and spending, and customer satisfaction with leading Infrastructure-as-a-Service (IaaS), Hosted Private and On-Premises Private Cloud vendors.

IT Briefcase Exclusive Interview with Napatech: What the Third Platform Requires of the Network

June 3, 2015 No Comments

Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.Read More >>>

Infographic: CTERA 2015 Enterprise Cloud Storage Survey

June 2, 2015 No Comments

Are enterprises boldly going where no enterprise has gone before? For the second year running, we’re excited to share the results of our annual Enterprise Cloud Storage Survey. Expanded this year to include 300 respondents, the survey results show that enterprises are aware and wary of file sharing in the cloud when done without policy and IT control. At the same time, we see growing adoption of private and hosted private (or virtual private) architectures to address security and privacy concerns.

Infographic: 7 Chilling Truths of Cloud Cybersecurity

May 28, 2015 No Comments

Check out this informative Infographic on Cloud Security!

IT Briefcase Exclusive Interview: Weighing the Options for Mobile Design in a Google-centric World

May 26, 2015 No Comments

with Sam Ganga, DMIIn this interview, Sam Ganga at DMI speaks with IT Briefcase on the three fastest-growing trends for addressing ecommerce through the mobile web and provide the pros and cons of each. Read More >>>

Adobe Cloud Security White Paper

May 18, 2015 No Comments

Adobe Document Cloud enables the workforce to increase productivity while staying secure.

Investing in Current Infrastructure or Migrating to Cloud-Based Managed Services?

May 18, 2015 No Comments

In 2013, Scandinavian research group SINTEF announced that 90 percent of all data ever created was generated during the two previous years. That time frame continues shrink as the rate of data creation increases exponentially. Mobile devices, computers, gaming systems and even your car all produce terabytes and terabytes of data. Under these conditions, every business needs to think seriously about their cloud options.

Don’t Get Lost in the Cloud: 10 Tips for Controlling Cloud Data

May 13, 2015 No Comments

by Gerry Grealish, PerspecsysWith information flowing more freely than ever in today’s digital economy, tracking sensitive data becomes an increasingly difficult task. In fact, findings from a recent study show more than half of IT professionals admit not having a complete picture of where their sensitive data lives. Read More >>>

4 Steps to Making a Smart Transition to the Cloud

May 11, 2015 No Comments

by Chris Unruh, Grant Thornton LLPDuring the past several years, cloud-based business applications and solutions have emerged as the next frontier for the IT function. The cloud has the potential to transform the way companies operate and enable businesses to access world-class software with little upfront cost. Read More >>>

Consumers Need an Education in Online Shopping Security 101

April 30, 2015 No Comments

by Robin Alden, Comodo CA Ltd.You place so much time and effort into the design and content of your website to increase its “stickiness” and turn online browsers into buyers, and with good reason. Consumers are increasingly doing more of their shopping online while doing so on a wide variety of devices with different screen sizes. Read More >>>

Eight Realities That Demand Multi-Factor Authentication

April 30, 2015 No Comments

by David Hald, SMS PASSCODESecurity is part and parcel of an IT admin’s job duties, but it is just one of a long litany of must-do’s that crowd each day. They put the basics in place, including antivirus software, passwords and firewalls, and then turn their attention to the latest priority or malfunction. Read More >>>

Another Dark Side of the Cloud: Data Center Migrations

April 23, 2015 No Comments

As business units and IT organizations move to the use of public cloud services, crucial application details often go missing. Some groups might not be particularly concerned by this. After all, as long as your application still performs well, why track the specific hardware used to support it? In the age of service level agreements and shared, multitenant architectures, does it really matter anymore if you know the physical server, storage system or network supporting your application as long as application performance meets users’ service level needs?

ADVERTISEMENT

DTX ExCeL London

WomeninTech