Inside the Briefcase


How can Big Data cross the Oceanic Gap?

How can Big Data cross the Oceanic Gap?

By Yves de Montcheuil, Talend
Big data technologies are definitely California-born. The Internet giants invented Hadoop and most NoSQL databases. Over the years, adoption has spread from “new economy” companies to almost all industries.
Read More >>>

Where does Security fit in DevOps?

Where does Security fit in DevOps?

By Eric Minick and Diana Kelley, IBM
Organizations are under increased pressure to continuously create and deploy innovative products, software, and apps. This added pressure makes it increasingly important to embed security throughout the entire development process.

IT Briefcase Exclusive Interview with Sai Sundhar Padmanabhan, ManageEngine

IT Briefcase Exclusive Interview with Sai Sundhar Padmanabhan, ManageEngine

with Sai Sundhar Padmanabhan, ManageEngine
Below, Sai Sundhar Padmanabhan, marketing analyst at ManageEngine, discusses the state of network traffic flows, why the ability to monitor high flow rates is critical to IT and business, and how to make...

Info-tech Vendor Landscape: Virtual Backup Software

Info-tech Vendor Landscape: Virtual Backup Software

This independent report from Info-Tech evaluates and scores 14 companies in the Virtual Machine Backup market. It can help you understand what's new in the virtual backup market, evaluate virtual backup vendors and products for your needs and determine...

Conquering the Top 5 Enterprise Data Protection Challenges

Conquering the Top 5 Enterprise Data Protection Challenges

Today's datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIO's conquering these types of challenges? Find...

Virtual Machine Backup: Is Your Organization Doing It Right?

Virtual Machine Backup: Is Your Organization Doing It Right?

If you're not virtualizing, you're missing reduced equipment, management, and utilities costs, along with increased server utilization rates and the right path to cloud computing. But when you virtualize, backup becomes even more of an issue. Traditional agent-based backup...

BYOD Security: 5 Tips for IT Professionals

BYOD Security: 5 Tips for IT Professionals

by Rick DelGado, Independent Author
Personal devices have become a common part of the working environment now. More and more, companies are adopting Bring Your Own Device (BYOD) policies, allowing employees to use their own devices both inside and outside...





Briefcase Highlights


DATA SECURITY

As Cybercrimes Soar, It’s Time to Rethink DIY (or BIY) Network Security

August 4, 2014 No Comments

Cyber-attacks and fraud maneuvers continue to climb in frequency and sophistication as cybercriminals keep penetrating vulnerable targets. As a result, the annual global cost of cybercrime rises continually and approaches a conservative $400 billion a year. Every day, 1.5 people become victims, and each year, more than 232 million identities are exposed.

Context-Aware Security: A Key to Successful BYOD

August 4, 2014 No Comments

by Neal Foster, DELL SoftwareHow can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day. Read More >>>

Threat Intelligence: The Key to a Complete Vulnerability Management Strategy

July 29, 2014 No Comments

Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.

The 2014 Application and Service Delivery Handbook

July 28, 2014 No Comments

This is the eight edition of what had previously been called the Application Delivery Handbook.

Data Centers in the Crosshairs: Today’s Most Dangerous Threats

July 28, 2014 No Comments

This paper analyzes the top five most dangerous threats to your data center.

Keeping Open-Source Safe

July 28, 2014 No Comments

With the recent spate of vulnerabilities found in OpenSSL, the security of open-source software has been put under the magnifying glass, with industry experts and software developers weighing the merits of using an open-source versus a proprietary code base. There are valid arguments for both, but ultimately the risk of a vulnerability can be the same whether rooted in proprietary or open source code.

What to do when you rely on Internal Names in TLS/SSL Certificates

July 28, 2014 No Comments

A deadline set by the CA/Browser Forum for the use of Internal Names is quickly approaching, and many system administrators need to understand how best to adapt to this change. At the same time, hundreds of new top-level domains are being launched, which redefines what constitutes an Internal Name. In this post we’ll explain what the changes are, why they’re being made, and how you can update your systems in response to the problem.

How to do SIEM on a Shoestring Budget

July 28, 2014 No Comments

by Nicole Pauls, SolarWindsSecurity information and event management (SIEM) software can seem like the perfect solution to smaller IT shops where resources are at a premium and where IT pros are constantly asked to do more with less. However, the reality they encounter is often anything but. Read More >>>

Globalizing the Continuous Delivery Pipeline

July 23, 2014 No Comments

by Rob Vandenberg, LingotekThanks to trends like BYOD and cloud computing, devops now works together as a unified organization, rather than throwing code over an invisible wall. It’s a necessary and timely evolution—especially for today’s sophisticated global IT environments. Read More >>>

How can Big Data cross the Oceanic Gap?

July 2, 2014 No Comments

By Yves de Montcheuil, TalendBig data technologies are definitely California-born. The Internet giants invented Hadoop and most NoSQL databases. Over the years, adoption has spread from “new economy” companies to almost all industries. Read More >>>

Where Do You Fall Within the Data Protection Divide?

July 1, 2014 No Comments

Ipswitch recently conducted a survey of more than100 IT professionals unveiling that employees feel an overwhelming sense of personal responsibility to protect corporate information or data. While accountability was high (84 percent) from an individual standpoint, 42 percent of respondents indicated that their organization does not mandate methods for securely transferring corporate files or have an automated system in place to mitigate the risk of human error.

BYOD Security Risks: Companies May Be Playing with Fire

June 26, 2014 No Comments

The BOYD policy has already become a substantial factor in the corporate world, with there being enough documented evidence to establish the fact that it gives a significant boost to employee’s productivity. As more and more companies are warming up to the idea of allowing personal mobile devices in the workplace, the security implications of adopting such a policy are becoming increasingly hard to ignore. Indeed, companies are putting a lot at risk for getting a bit more out of their employees.

Where does Security fit in DevOps?

June 24, 2014 No Comments

By Eric Minick and Diana Kelley, IBMOrganizations are under increased pressure to continuously create and deploy innovative products, software, and apps. This added pressure makes it increasingly important to embed security throughout the entire development process. Read More >>>

Simplifying the Development and Publishing of Apps for Businesses Today

June 24, 2014 No Comments

As digitization and mobility in companies become all pervasive, and IT departments continue to strive to do more with less, the shortage of IT skills to support Mobile Apps development and publishing is an increasingly acute issue.

Top Tips for an Effective Cloud Migration

June 11, 2014 No Comments

By Sarah Lahav, SysAid TechnologiesFor organizations built on in-house IT solutions, making too many changes too quickly can introduce unknown risks and frustrate end users who need to learn new software. The transition to the cloud therefore calls for a strategy. Read More >>>

How Greed, Generosity and the Defense of Civil Liberties Can Put Your Data at Risk

June 10, 2014 No Comments

By Cam Roberson, Beachhead SolutionsSome human traits are security hazards – but not always because they are faults. As a matter of fact, some traits directly and deliberately engineer situations in which data leaks are more likely. Read More >>>

Cloud Security Readiness Tool

June 3, 2014 No Comments

The Cloud Security Readiness Tool evaluates whether cloud adoption will meet their business needs.

IT Briefcase Exclusive Interview with Sai Sundhar Padmanabhan, ManageEngine

June 3, 2014 No Comments

with Sai Sundhar Padmanabhan, ManageEngineBelow, Sai Sundhar Padmanabhan, marketing analyst at ManageEngine, discusses the state of network traffic flows, why the ability to monitor high flow rates is critical to IT and business, and how to make sure you can handle high flows.      Read More >>>

Upskilling for the Modern Data Center

May 28, 2014 No Comments

by Antonella Corno, CiscoToday’s data center bears very little resemblance to the data center of just a few years ago. The rapid evolution of technology, while an overall boon for business, has created a dual challenge for many IT departments. Read More >>>

The Files Ruining Your Sharing Policies

May 27, 2014 1 Comment

According to Ponemon’s 2013 Cost of Data Breach Study, the majority of information leaks aren’t caused by malicious or criminal attacks. Rather, about two-thirds of data breaches are actually due to system glitches and human factors. You can’t afford to let users break important information-sharing policies. The study found the average cost of a data breach in the United States is US$188 per record, which makes the average organizational cost more than $5.4 million.

Managing IT Points of Failures: Separating a Fire Drill from a Fire

May 21, 2014 No Comments

by Deepak Kanwar, ZenossA red flag on the IT operations dashboard at many organizations still means “All Hands on Deck,” a failure has been detected, it’s time to grab the safety gear and ready the hoses for what could be hours of intense fighting. Read More >>>

Five Worst Practices to Avoid in the Cloud

May 20, 2014 No Comments

Businesses of all sizes are moving to the cloud in droves, looking for flexible, cost-effective solutions that enable their operations to run more efficiently. This move by businesses to migrate their IT services, applications and infrastructure to a cloud-based architecture will cause market revenue to reach an estimated $174.2 billion this year, up 20 percent from $145.2 billion in 2013, according to new research from IHS Research. By 2017, enterprise spending on the cloud will amount to a projected $235.1 billion, IHS predicts.

Meeting Healthcare’s Requirements for Effective Data Protection

May 14, 2014 No Comments

Electronic Health Records (EHR) hold the key to higher quality and more accurate patient care. But they also cause healthcare providers, pharmaceutical firms and insurance payers to generate massive volumes of data. Imaging, diagnostics, prescriptions, patient records, claims and other protected health information — all must be safely backed up and kept quickly restorable to assure that they are protected, available and securely accessible as needed by providers and as required by law.

IT Briefcase Exclusive Interview with Ed Brill, Director, Mobile Enterprise Marketing, IBM

May 9, 2014 No Comments

with Ed Brill, IBM Social BusinessIn this interview, Ed Brill from IBM Social Business discusses mobile as a business transformation tool and considerations for the ‘upwardly mobile’ enterprise. Read More >>>

Info-tech Vendor Landscape: Virtual Backup Software

May 6, 2014 No Comments

This independent report from Info-Tech evaluates and scores 14 companies in the Virtual Machine Backup market. It can help you understand what’s new in the virtual backup market, evaluate virtual backup vendors and products for your needs and determine which products are most appropriate for your organization. Find out why Symantec was named a “Champion” in virtual backup software.

Conquering the Top 5 Enterprise Data Protection Challenges

May 6, 2014 No Comments

Today’s datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIO’s conquering these types of challenges? Find out how in this white paper by vExpert, David Davis!

Virtual Machine Backup: Is Your Organization Doing It Right?

May 6, 2014 No Comments

If you’re not virtualizing, you’re missing reduced equipment, management, and utilities costs, along with increased server utilization rates and the right path to cloud computing. But when you virtualize, backup becomes even more of an issue. Traditional agent-based backup and recovery won’t work in a virtual environment. Going without a solid backup and recovery plan for your virtualized data is an unacceptable business risk. Check out this easy-to absorb infographic to learn the five things to look for in a virtual machine backup solution.

The New IT for Small Businesses: The Costs and Benefits of Utilizing Emerging Technologies to Drive Competitive Advantage

May 6, 2014 No Comments

by Suaad Sait, SolarwindsThe practice of IT is in a constant state of change – from the birth of the mainframe to the personal computer explosion to the data center boom. We are now in an era where IT is a part of every business, not just big business or those placed squarely in the tech industry. Read More >>>

KnowBe4 Warns: Third Ransomware Strain Called CryptorBit Attacks

May 6, 2014 No Comments

Security Awareness Training expert KnowBe4 issued a warning of a third criminal ransomware gang ramping up their attacks. The malware is called CryptorBit, (also known as HowDecrypt), and follows a very similar attack process as CryptoLocker and CryptoDefense, but the malware corrupts the first 512 or 1024 bytes of -any- data file it finds, regardless of extension increasing its potential to wreak havoc.

BYOD Security: 5 Tips for IT Professionals

May 5, 2014 No Comments

by Rick DelGado, Independent AuthorPersonal devices have become a common part of the working environment now. More and more, companies are adopting Bring Your Own Device (BYOD) policies, allowing employees to use their own devices both inside and outside the office.Read More >>>

ADVERTISEMENT

DTX ExCeL London

WomeninTech