Featured Blogs

5 Web Analytics Solutions for eCommerce Websites

Blog post recommended on January 28, 2016

Incredible opportunities offered by the “API economy”

Blog post recommended on January 20, 2016

All Systems Fail

Blog post recommended on December 2, 2015

IT Briefcase Analyst Blog

8 Ways to Think Like a ‘Quant’

number eight
By Joe McKendrick, Author and Independent Researcher
Data analytics is a skill that has applications at every level of the enterprise. For marketers, there are opportunities to slice and dice customer segments to better understand their purchasing patterns.
Read More >>>

Here’s the Long-Awaited ‘Silver Bullet’ for Data Security: Plain Old Elbow Grease

By Joe McKendrick, Author and Independent Researcher
Verizon just released the latest edition of its annual Data Breach Investigations Report, and it reveals that most data security breaches don't have to happen – yet, they still do keep on taking place.
Read More >>>

VIEW ALL IT Briefcase Analyst Blog Articles


IT Briefcase Exclusive Interview: Hottest Trends for Government IT Leaders in 2016

Ritesh image chart
with Chadd Kenney, Pure Storage
In this interview, Chad Kenney discusses how critical laying strategic foundational IT infrastructure is for success in the short-term and over the long haul.
Read More >>>

The Access and Identity Market Is Growing: Here’s Why

by Dean Wiech, Tools4ever
While as a whole, the IAM market has been growing, there have been certain areas and solutions that have, in particular, shown great growth. What are these and why have organizations of all sizes been implementing them? Read More >>>


Featured Video

Business Models And The Internet of Things

Even though digitalisation has radically changed the way we do business, the physical and the digital world are still separated from each other. This is, however, about to change with the Internet of Things. The Internet of Things stands for the vision that the physical world of atoms and the digital world of bits merge together.

Produced By: © University of St.Gallen (HSG)
Text by Prof. Dr. Elgar Fleisch und Dr. Markus Weinberger
Production: http://www.zense.ch
Academic Director: Prof. Dr. Thomas Beschorner


Featured Webinars & Videos

Identity and Access Management for Hadoop: The Cornerstone for Big Data Security

Learn how an integrated security strategy can secure and simplify access to Hadoop environments, while leveraging your existing identity management infrastructure.

Simplify and Secure Your Hadoop Environment

Watch this webcast to explore Hadoop security challenges and trends.

Cloud-based Privileged Identity Management for the Modern Enterprise

Privileged identities are the number one target of hackers and the reason 80% of data breaches succeed. Protect your organization by minimizing the number of privileged identities.

Survive Hadoop Go-Live: Achieving Security, Compliance and Business Needs

Get insights on securing the Hadoop infrastructure, as well as the data in Hadoop.

Comprehensive Privileged Identity Management and Audit for Red Hat Enterprise Linux Product

Join Tony Goulding from Centrify and Jeff Williams from the National Weather Service to explore the benefits of using Centrify Server Suite to centralize RHEL identities within Active Directory and granularly control privileges, while auditing all privileged activity.


Featured White Papers

Taking Your Enterprise Mobile: The Executive Checklist

Consumer mobile devices are so compelling and offer business users such a powerful medium for learning, transacting, sharing, and presenting that companies are willing to upend the “way we do things around here” to have them. Download this white paper to read about what you need to do to...

SECURITY LEADERSHIP SERIES EBOOK: Security Strategies for Success

Are you protecting the information that matters most? In this exclusive Security Leadership Series eBook, Citrix chief information security officer Stan Black and chief security strategist Kurt Roemer share best practices for security. For IT leaders, these security strategies for success are essential reading. Get started today.

Enterprise Mobility Best Practices: MDM, Containerization or Both?

Today, the market tells a slightly different story. MDM is still the preferred method for BYOD security, according to a Technavio report.

IT Brand Pulse: Application Delivery Controller 2015 Brand Leader Report

IT Brand Pulse: Application Delivery Controller 2015 Brand Leader Report

2015 Cyberthreat Defense Report – Executive Summary

Learn how web applications and mobile devices impact IT’s ability to successfully defend against cyberthreats, and find out why SDN may be the solution.