Join the IT Briefcase Community!

Please login with your email address and password below.

Register Button
Forgot Password?

IT Briecase respects your privacy.

Follow us...

Follow us on Twitter Join our LinkedIn community Find us on Facebook Subscribe to ITBriefcase RSS Feed Info at Virtual Star Media

Recent News

FedRAMP Authorizes First Cloud Provider for Voice and Collaboration

News Posted on August 18, 2016

Schneider Electric and ZeoGas Announce Master Service Agreement for Oil & Gas facilities

News Posted on August 4, 2016

The Benefits of Online Taxi Booking Software

News Posted on August 4, 2016

Gartner Identity & Access Management Summit

News Posted on July 28, 2016

The Advancement of Taxi App Development

News Posted on July 28, 2016

IBM Security Tackles Insider Threats with User Behavior Analytics

News Posted on July 27, 2016

IT Briefcase Analyst Blog

The Path to 2020: Marketers Seize the Customer Experience

Analyst Report
Download this report to learn about this transformation and hear perspectives from CMOs at Georgetown University , JPMorgan Chase, Philips, Pure Storage and Unilever. Read More >>>

2016 APM Reference Guide: Application Performance Monitoring

growth chart
IT Briefcase Analyst Report
This product guide allows you to quickly assess -- current products in the market, deployment options, basic differences by monitoring features, the stability of suppliers and more.
Read More >>>

VIEW ALL IT Briefcase Analyst Blog Articles


IT Briefcase Exclusive Interview: Top 5 Must-have Security Features Every USB Drive Should Have

cyber security_2
with Mike McCandless, Apricorn

In this interview, Apricorn VP Mike McCandless provides insight into the top must-have security features that every USB drive should contain.
Read More >>>

IT Briefcase Exclusive Interview: The Rise of Machine Learning Analytics

with Jerry Melnick, SIOS
In this interview, SIOS Technology President and CEO Jerry Melnick speaks with IT Briefcase about optimizing infrastructure operations and application performance in complex VMware environments.
Read More >>>


Featured Video

Breaking the Cycle of Data Hoarding

Government Organizations compile data like no other, storing on average 2.63 petabytes at any one time. That's 167 times the information in all the books in the Library of Congress. For Defense organizations, where the mission is critical and lives are on the line, how do you break that data hoarding cycle? How do you shine a light on redundant, outdated and trivial data that may be clogging up your workflow and hampering your mission? Veritas


Featured Webinars & Videos

4 Steps to a Successful Cloud Contact Center

This white paper outlines how today’s most modern enterprises are evolving their contact centers to achieve strategic organizational goals, from revenue retention to sales growth, and more.

Webcast: The Phantom Identity Menace

Attackers are moving away from direct assault, and instead are hijacking and exploiting user credentials to thwart security tools, and gain easy access to business data. How can you strike back and stop breaches that attack your users far, far away?

Webcast: They have all our passwords. It’s time for MFA everywhere.

Let’s face it. With so many credentials having been compromised and made available to attackers, password-based security is no longer effective. We know that eliminating passwords is the right thing to do, but that takes time, and the bad guys are already inside our networks.

2016 Cyberthreat Defense Report

The Cyberthreat Defense Report examines the current and planned deployment of counter measures against the backdrop of numerous perceptions.

Are You Equipped to Win the Latest Battle Facing IT?

Delivering what people expect from their technology while maintaining the secure environment for which IT is responsible. It’s called People-Centric IT as a Service (ITaaS) and this infographic will show you just how effective it can be in resolving your everyday, every way battles.


Featured White Papers

ESG Lab Review: IBM Data Protection for Virtual Environments: Extending IBM Spectrum Protect Solutions to VMware and Hyper-V Environments

This ESG Lab Review documents remote hands-on testing of IBM Spectrum Protect solutions for virtual environments.

ESG Lab Validation Report: IBM Spectrum Protect – Simplified Data Protection for the Modern Enterprise

This ESG Lab Validation documents remote hands-on testing of IBM Spectrum Protect.

Ten ways to save money with IBM data protection

This white paper describes 10 ways that IBM data protection solutions can help organizations save money while addressing mod- ern data protection challenges.

How Modern BPM Can Transform Your Business

Business transformation isn’t about going digital; it’s about empowering people to work at their best in a digital world. Modern BPM is what makes that possible.

IDC Report: Achieving Flash Storage Nirvana

This IDC Flash discusses Nimble Storage's introduction of an all-flash array (AFA), the AF-Series, as an addition to the company's already very successful CS-Series line of hybrid-flash arrays (HFAs), on February 23, 2016. This Flash discusses Nimble's entry into the AFA space and updates IDC's view of the company's...