Inside the Briefcase


IT Briefcase Exclusive Interview: The Changing Complexion of Secure File Transfer in 2014

IT Briefcase Exclusive Interview: The Changing Complexion of Secure File Transfer in 2014

with Bill Ho, President at Biscom
In this interview, Bill Ho offers expert advice for organizations looking to tackle cloud and mobile challenges, as well as increase productivity while retaining data security. Read More >>>

Taking on Cyberthreats and Driving Value with Managed Security Services

Taking on Cyberthreats and Driving Value with Managed Security Services

Tweet IT departments everywhere are confronting a dangerous mix of escalating cyberattacks and stagnant budgets. Factor in the security threat of mobile devices and the rise in compliance demands, and the situation threatens to spin out of control. CSC,...

The Security Landscape: Converging Waves of Pain

The Security Landscape: Converging Waves of Pain

Tweet With the pace of change overwhelming security efforts, how can IT take control? In today’s world of anytime, anywhere connectivity, IT’s marching orders seem like a contradiction in terms: give employees, partners, and customers access to everything they need...

History Says So….Crowdsourcing will change your life.

History Says So….Crowdsourcing will change your life.

with Siamak Farah, InfoStreet
We live in very exciting times. Wave after wave of technological innovations are changing our lives on a daily basis. Often, we don’t notice the change until we are swept up by it. For...

Presidential Order and Directive Set New Initiatives and Mandates for Securing Critical Infrastructure

Presidential Order and Directive Set New Initiatives and Mandates for Securing Critical Infrastructure

This white paper from CSC looks at the consequences of the Presidential Order and initiatives for securing critical infrastructures and the next steps organizations should take.





Briefcase Highlights


DATA SECURITY

Software Market Influenced by Nexus of Forces: Gartner

December 23, 2013 No Comments

By Patrick Burke, RackspaceGartner said that technology providers must realize that the disruptive forces of cloud, information, mobile and social will reach mainstream status in 2014. Read More >>>

Explaining Hadoop to the Non Data Geeks at the Office

December 19, 2013 No Comments

by Gil Allouche, QuobleThink about how much backstory is in just that one statement: what Hadoop is, why Hadoop matters, what the Hadoop ecosystem is, why it matters, what cloud computing is… you get my point. Read More >>>

IT Briefcase Exclusive Interview: The Changing Complexion of Secure File Transfer in 2014

December 19, 2013 No Comments

with Bill Ho, President at Biscom In this interview, Bill Ho offers expert advice for organizations looking to tackle cloud and mobile challenges, as well as increase productivity while retaining data security. Read More >>>

The Rise of SaaS in the Enterprise and the Shifting Role of IT

December 17, 2013 No Comments

by Mike Kane, SoftchoiceEnterprise technology is evolving. Adoption of cloud applications such as Evernote and LogMeIn – consumer-grade tools employees depend on for day-to-day productivity – is booming, but as more users embrace these tools, organizations face a perilous double-edged sword. Read More >>>

You’ve Adopted Virtualization. Now It’s Time To Update Your Security Policy

December 10, 2013 No Comments

By Shawn Wilson, NeXt ITAs private cloud and virtual desktop infrastructure technology continue to push growth, the promise of ROI rules the dialogue, resulting in the auditing of security policies getting overlooked. Read More >>>

Infographic: Cross-Platform Malware is A Growing Threat For Computers

December 10, 2013 No Comments

There is a new threat in town when it comes to malware; it attacks without prejudice and it’s got cross-platform power. The same strain of a particular malware and virus, if it has cross-platform ability, can hit multiple OS such as Windows, Mac and Linux etc., simultaneously. It is exceedingly harmful because it has the ability to not just infiltrate multiple OS, but also transfer infection from one platform to another with no trouble at all.

Firewall Buyer’s Guide

December 9, 2013 No Comments

The definitive guide for evaluating enterprise network firewalls.

Cybersecurity Imperatives: Reinvent Your Network Security

December 9, 2013 No Comments

Download this white paper and learn how your organization can pursue the deployment of the innovative technologies and applications you need to thrive and protect your assets against all types of cyberthreats.

Network, server, storage, and desktop virtualization: Which one is for your business?

December 9, 2013 No Comments

By Zane Gramendis, East Coast ComputerNot many IT managers remain a stranger to the term virtualization anymore. However, few understand the differences between the types of virtualization technologies and what benefits each solution has to offer. Read More >>>

Security vendors face declining sales as SaaS customers rely on cloud providers for security controls

December 9, 2013 No Comments

Technology Business Research Inc. (TBR) recently identified a growing trend among organizations using Software as a Service (SaaS): Increasing use of cloud services is disrupting sales for security vendors. Security vendors that sell products or services directly to end-user organizations will experience a reduction in revenues in 2014 as more organizations move applications and data to the cloud.

Locking Down the Cloud Part 4: Monitoring the Cloud

December 5, 2013 No Comments

By Kurt Hagerman, FireHostIf you’ve been paying attention to this series these past few months, you know by now how to lock down the cloud. In parts I, II and III, we talked about the importance of performance, compliance and security in a successful cloud infrastructure. Read More >>>

Survey: Constant Connectivity Leads to Conflicting Views

December 4, 2013 No Comments

By John Pironti, IP ArchitectsAmericans love their electronic devices and the connectivity they provide, as evidenced by the number of Internet-connected devices they own. But a new survey shows that most are struggling with data privacy and security concerns that come with the conveniences of an increasingly always-online lifestyle. Read More >>>

Why File Server Auditing is Important and Why Just Native Auditing is Not Enough

November 25, 2013 No Comments

by Steven Smith, Technology ReviewerFile server auditing ensures safe and secure File server environment where all the critical data stored remains safe and out of the reach of the rogue users. Read More >>>

Taking on Cyberthreats and Driving Value with Managed Security Services

November 20, 2013 No Comments

Tweet IT departments everywhere are confronting a dangerous mix of escalating cyberattacks and stagnant budgets. Factor in the security threat of mobile devices and the rise in compliance demands, and the situation threatens to spin out of control. CSC, in partnership with RSA and IDG Research, recently surveyed IT professionals across a wide array of […]

The Security Landscape: Converging Waves of Pain

November 20, 2013 No Comments

Tweet With the pace of change overwhelming security efforts, how can IT take control? In today’s world of anytime, anywhere connectivity, IT’s marching orders seem like a contradiction in terms: give employees, partners, and customers access to everything they need when they need it, and keep it secure. Even this statement oversimplifies the problem, because IT […]

Taking the Leap to Virtualization

November 18, 2013 No Comments

Read this whitepaper to learn how virtualization offers dramatic benefits for midsize companies, including efficiency, cost savings, and increased reliability and performance. Find out the best way to implement a virtualization solution to allow you to do more with less and free up IT staff to focus on strategic projects that help your company grow.

Virtual Machine Backup and Recovery: Five Critical Decisions

November 18, 2013 No Comments

This paper explores the five critical decisions organizations must adhere to when building a backup and recovery plan to prevent the complexity of virtualization that complicates IT services and the day-to-day of IT professionals across industries. It covers complete backup and recovery solutions, purpose built for organizations with specific virtualization requirements.

ESG Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual Environments

November 18, 2013 No Comments

This whitepaper covers what to look for in a virtualization protection solution as well as whether to consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities.

Accelerate your Success through Virtualization

November 15, 2013 No Comments

This executive summary provides insight into the challenges organizations face when moving to a virtualized environment and covers best practices and solutions to help. Learn more about Symantec’s unique solution to IT environments looking to take full advantage of virtualization.

History Says So….Crowdsourcing will change your life.

November 15, 2013 No Comments

with Siamak Farah, InfoStreetWe live in very exciting times. Wave after wave of technological innovations are changing our lives on a daily basis. Often, we don’t notice the change until we are swept up by it. For instance, who amongst us would have said that they would use a tablet even as recent as 10 years ago? Read More >>>

Mining Dark Data for Business Gold

November 13, 2013 No Comments

CommVaultIt may not seem like much, but the “dark data” accumulated over the years you’ve been in business could be an untapped digital gold mine, which could give your company a competitive advantage if used in conjunction with the critical data you employ every day. Read More >>>

Presidential Order and Directive Set New Initiatives and Mandates for Securing Critical Infrastructure

November 12, 2013 No Comments

This white paper from CSC looks at the consequences of the Presidential Order and initiatives for securing critical infrastructures and the next steps organizations should take.

CA-Issued Certificates: Grade A Value for Today’s Publishers

November 12, 2013 No Comments

CA Security CouncilNow, with digital information ranking so high on our list of assets to protect, the thought of trusting an obscure website with our credit card details seems as unthinkable as picking up a piece of gum we find on the street and popping it into our mouth. Read More >>>

IT Briefcase Exclusive Interview with Rajesh Ganesan, ManageEngine – Union of Service Desk and Other Business Services

November 8, 2013 No Comments

With Rajesh Ganesan, ManageEngineIn the discussion below, Rajesh Ganesan from ManageEngine talks about the move to help IT provide more value by fusing the IT service desk with the tools needed to create business applications and services for their end users. Read More >>>

Nexgate Unifies Security and Compliance for Social CRM

November 6, 2013 No Comments

Nexgate, an innovator in social media brand protection and compliance, today announced support for both Salesforce Chatter and Salesforce ExactTarget Marketing Cloud. Available immediately, joint customers can benefit from fully unified social media security and compliance controls across both their internal Chatter-based social collaboration and public-facing, ExactTarget Marketing Cloud powered, social networking on Facebook, Twitter, Google+, LinkedIn, YouTube, and more.

How Cloud-Based Disaster Recovery Allows You To Protect and Recover Your Applications After a Disaster

November 4, 2013 No Comments

Disasters happen, especially when it comes to technology. Hurricanes, floods and viruses are all well known, but we took a look at a lesser-known phenomena: the zombie apocalypse and the impact it could have on your business.

Clever Two-Factor Authentication Using Illiri Sound and Device Pairing

October 30, 2013 No Comments

Admit it — your users hate two-factor authentication. It is the cherry on top of bubbling frustration with logging in or losing access to their account.

10 Reasons You Need Network and Application Visibility

October 28, 2013 No Comments

An independent ROI study of Cascade customers, conducted by IDC in April 2010, found a remarkable three-year ROI of 364% and a payback period of just 5.5 months. Find out how Cascade and other Riverbed technologies can accelerate IT performance and save money for your organization.

How The SPDZ MCP Protocol Will Impact Cloud Security

October 28, 2013 No Comments

with James Snowhill, Independent AuthorIn recent years, cloud computing has increasingly become a part of our day to day lives and yet many people are still wary of embracing the new technology. One of the major concerns that is behind this reluctance is security. Read More >>>

DDoS Perpetrators Changed Tactics in Q3 2013 to Amplify Attack Sizes and Hide Identities

October 23, 2013 No Comments

Prolexic Technologies, the global leader in Distributed Denial of Service (DDoS) protection services, today reported that DDoS perpetrators changed tactics in Q3 2013 to boost attack sizes and hide their identities. This observation is one of many key findings found in the company’s Q3 2013 Global DDoS Attack Report, which was published today, and can be downloaded from www.prolexic.com/attackreports.

ADVERTISEMENT

DTX ExCeL London

WomeninTech