Join the IT Briefcase Community!

Please login with your email address and password below.

Register Button
Forgot Password?

IT Briecase respects your privacy.

Follow us...

Follow us on Twitter Join our LinkedIn community Find us on Facebook Subscribe to ITBriefcase RSS Feed Info at Virtual Star Media

Recent News

IBM Scales DevOps for Large Enterprises with New Hybrid Cloud Solutions

News Posted on November 21, 2014

IBM Unveils New Holiday Shopping Trend Analysis App

News Posted on November 21, 2014

Must Read SolarWinds IT Security Survey

News Posted on November 21, 2014

IBM Verse Fuses Cloud, Social, Analytics and Design Innovation to Transform the Way We Work

News Posted on November 18, 2014

Trend Micro Deep Security Now Available on AWS Marketplace

News Posted on November 14, 2014

IBM Study: IT Departments Build Shared Value, Shared Belief with Business Leaders

News Posted on November 14, 2014

IT Briefcase Analyst Blog

Exclusive Webcast: 8 Great Mysteries of Cloud Computing

8 Great Mysteries Cloud
Listen to this exclusive webcast as we reveal eight unsolved mysteries that are accompanying the great cloud computing migration.
View Webcast

Podcast: Humanizing BPM with Clay Richardson, Forrester Research

Clay Richardson
In this brief podcast, Clay Richardson, Principle Analyst at Forrester Research, discusses the future of BPM and emphasizes the value of the user experience, referring to business processes today as existing within the “Age of the Customer”.

VIEW ALL IT Briefcase Analyst Blog Articles


Security Best Practices for E-Signatures

By Michael Laurie, Silanis Technology
Electronic signatures are a critical technology for new business process improvements in industries such as banking, insurance, real estate and healthcare. With security understandably being a top concern for those looking to implement a cloud-based e-signature solution, it is not enough to simply look for one that is ESIGN compliant. Read More >>>

Why Shellshock is Absolutely Terrifying for BYOD Security

Fine tuning mobile
By Israel Lifshitz, Nubo
Late last month, it was discovered that the security vulnerability Shellshock can be made wormable and grant hackers the ability to run arbitrary codes on Bash, the most widely-used command processor which serves as the default shell for Unix, Linux and Mac OS X.
Read More >>>


Featured Video

Where Do Turkeys Come From? Let's Find Out Using Power BI

Power Map tour of turkey consumption in the US.

The Power BI team decided to look at turkey production and consumption with some Power Map magic to see what states will be most "thank-full" of bird this year...


Featured Webinars & Videos

Modernizing Data Protection for SMBs

In this webcast analyst Dave Vellante of Wikibon and RJ Nichols of Tech Data discuss the data protection challenges facing SMBs.

Smarter Data Protection for your Evolving Business

If your business is like many organizations that need to deliver 100% data availability, manage rapid data growth; yet control costs, now is the time to discover how modernized data protection can help your organization deliver better outcomes.

Taking Control of Data Debris Benefits IT and Beyond

In this webinar based on his article in ComputerWorld, CGOC faculty member David White describes how data retention is getting out of hand at many organizations.

Talking Results: Nuance Communications and IBM Harness Big Data with Elastic Storage

Please Join IBM and Nuance Communications Inc. to learn how Nuance uses IBM Elastic Storage to improve the power of their voice recognition applications by managing storage growth, cost and complexity while increasing performance and data availability.

How Storage Infrastructure Can Help You Differentiate and Add Value to Your Cloud Storage Services

This roundtable discussion with a successful Service Provider and an IBM expert offers great insights on how the right choice of infrastructure impacts your ability to deliver on those expectations.


Featured White Papers

Part 2 – The 2014 Application & Service Delivery Handbook: Network and Application Optimization

In this second of four installments, this handbook focuses on describing the technologies, products and services that are available to improve the performance of applications and services.

Mobile First: Securing Information Sprawl

In a recent survey, “The Mobile Trust Gap,” MobileIron reported that of the 3000 respondents, 80% claimed they are using personal smartphones and tablets for work.

Symantec Internet Security Threat Report 2014

The Internet Security Threat Report provides an overview and analysis of the year’s global internet threat activity. The report is based on data from the Symantec™ Global Intelligence Network, which Symantec’s analysts use to identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.

SANS Report Breaches Happen: Be Prepared

Computer viruses are yesterday’s news; automated attacks that morph rapidly, concealing themselves through encryption and deceptive packaging, are the new hotness. This paper describes how to start with improved malware reporting and gateway monitoring and how to combine this output with security intelligence from both internal and external resources.

Symantec Intelligence Report: September 2014

The monthly intelligence report, provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.