Inside the Briefcase

Briefcase Highlights


5 Key Considerations for Choosing a Managed Hosting Provider

May 24, 2016 No Comments

Selecting the right Managed Hosting provider is a business-critical decision. Before you short list providers or sign a contract, understand the 5 universal principles for choosing the best partner for your business and best servicesyou’re your application portfolio.

The Low Down on High Availability in the Cloud

May 24, 2016 No Comments

Whether it’s Public Cloud, bare metal or hybrid, there is no magic recipe for achieving high availability.

Switching to Cloud Storage to Ready Our 80-Year-Old Photography Company for the Future

May 24, 2016 No Comments

We’ve been serving the still photography needs of businesses in the Boston area since the 1930s, all the while constantly adapting to keep up with new technology. Whether it’s transitioning from film to digital photography and computer applications, to pivoting away from phone sales and into building an effective web presence, a lot has changed since FayFoto’s beginning (and not just that the Red Sox have won a few World Series).

5 Best Practices for Cloud Security

May 24, 2016 No Comments

Use these 5 best practices to ensure your provider has you covered.

Six Things You Didn’t Know About Your Company’s Cloud Apps

May 23, 2016 No Comments

When building a cloud app security strategy, it’s easy for most IT leaders within a company to assume that blocking all risky file sharing apps is the answer. It’s an understandable assumption to make, given that 91 percent of apps aren’t enterprise-ready and lack in important areas like security and privacy, according to Netskope’s latest cloud report.

Is the Cloud Ready for Your Most Sensitive Workloads?

May 20, 2016 No Comments

In the minds of most IT professionals, the debate about the value and appropriateness of the cloud for most workloads is long over. Any remaining resistance is typically overcome by the recognition that in the absence of a sanctioned cloud solution, user-created workarounds for sharing content introduce major points of risk. But there are some areas where caution still holds sway and adoption has been slower, including professional services firms and corporate IT serving legal, financial services, healthcare and other sensitive and regulated domains.

How To Do Enterprise Security like Bond…James Bond

May 17, 2016 No Comments

In the era of crippling state-sponsored hacks, cybercrime rings and data breaches, businesses are looking at all forms of preventative measures to keep attackers at bay. Even a modern-day James Bond would find it challenging to keep his data, and identity, a secret in the Information Age. And unlike in the famous films, the real-life ‘villains’ capable of stealing trade secrets, personal information and other forms of sensitive data are oftentimes anonymous and numerous. Reports estimated more than 317 million new pieces of malware were created within 2015 alone. Imagine what they can do today!

4 Steps to a Successful Cloud Contact Center

May 12, 2016 No Comments

This white paper outlines how today’s most modern enterprises are evolving their contact centers to achieve strategic organizational goals, from revenue retention to sales growth, and more.

Finding a True Cloud Contact Center

May 12, 2016 No Comments

Cloud Technology is one of the most misunderstood concepts of our time.

Maintaining Compliance for the Cloud Generation

May 12, 2016 No Comments

Learn the critical steps to prevent data leakage.

Innovation for the Cloud Generation

May 12, 2016 No Comments

This guide helps you identify and address the unexpected risks of the “cloud generation.”

Finding a True Cloud Contact Center

May 10, 2016 No Comments

Cloud Technology is one of the most misunderstood concepts of our time. Although delivering software as a service (SaaS) from the cloud has distinct advantages, the market is so filled with hype, it is difficult to decipher between what is myth and what is reality.

IT Briefcase Exclusive Interview: Steps for Successful VDI Implementation

May 6, 2016 No Comments

with Jeremy Moskowitz, Founder and CEO, PolicyPak SoftwareIn this interview, Jeremy Moskowitz, founder and CEO of PolicyPak, speaks with IT Briefcase on the challenges and opportunities of using a virtual desktop infrastructure (VDI.)Read More >>>

10 Tips for Protecting Data in the Cloud

May 3, 2016 No Comments

DON’T GET LOST IN THE CLOUD – You can’t just write off cloud services due to security concerns. Get solid advice here.

Cloud Security Report

May 3, 2016 No Comments

In this report, you will gain a greater understanding of how industry and online presence drive your threat profile, how the Cyber Kill Chain construct drives understanding, and get recommendations on how to improve your security posture.

Top 5 Businesses that Can Benefit Most from Cloud Computing

May 2, 2016 No Comments

As time goes by, Cloud computing is taking on greater roles in the world of business which leads many to wonder why more companies aren’t taking advantage of the many benefits inherent in this type of technology. Unfortunately, the reason for this is probably based on the fact that few people actually have a sound understanding of what it means to work in the Cloud.

Forrester Market Overview: Use Project Services To Accelerate Infrastructure Transformation

May 2, 2016 No Comments

The pace of digital transformation and cloud migration is forcing IT professionals to review their current infrastructure and force change to accommodate new business demands brought on by the age of the customer. Many organizations are motivated by fear, such as of the potential business disruption in their industries from new digital startups like airbnb or uber; more optimistically, they’re motivated by the opportunities brought by digital technologies to improve their customers’ experience.

Scale-Out NAS: Best Practices to Implement Tomorrow’s Storage Today

April 29, 2016 No Comments

by Stefan Bernbo, CompuverdeAs the data deluge continues on unabated, vertically scaling legacy approaches to storage are falling short. Organizations need to find a way to store high volumes of data without busting the budget, all while maintaining high levels of performance… Read More >>>

Gartner MQ on Disaster Recovery as a Service

April 29, 2016 No Comments

Among providers of disaster recovery as a service there is wide variance in experience and service quality, together with other key differentiating factors. Data center managers should use this Magic Quadrant to help them evaluate providers of DRaaS services.

IT Briefcase Exclusive Interview: The rise of cloud application control technology

April 26, 2016 No Comments

with Ed Macnair, CEO, CensorNetIn this interview, Ed Macnair, CEO of CensorNet, speaks with IT Briefcase on how security technologies needs to evolve to meet the challenge and opportunities of cloud computing.Read More >>>

The Forrester Wave™: Hybrid Cloud Management Solutions, Q1 2016

April 19, 2016 No Comments

In Forrester’s 40-criteria evaluation of private cloud solution vendors, we identified the nine most significant software providers — BMC Software, Cisco Systems, Citrix, Hewlett Packard Enterprise, Huawei, IBM, Microsoft, Red Hat, and VMware — in the category and researched, analyzed, and scored them.

The Forrester Wave™: Private Cloud Software Suites, Q1 2016

April 19, 2016 No Comments

In Forrester’s 32-criteria evaluation of hybrid cloud management solution vendors, we identified 11 significant software providers — BMC Software, Citrix, CliQr Technologies, Dell, Hewlett Packard Enterprise, IBM, Microsoft, Red Hat, RightScale, Scalr, and VMware — in the category and researched, analyzed, and scored them.

Fog Computing: The Imminent Future of the IoT

April 18, 2016 No Comments

While the Internet of Things continues to present a mind bending concept, which we are more or less witnessing in this phase of development, hardly anyone argues about the back end conditions of this notion. The question of storing the amount of data for 22 billion devices total, and how our cloud platforms will actually compute by the end of the year 2018, remains a little bit foggy.

Most secure Cloud Services for Your Small Businesses

April 15, 2016 No Comments

There is no denying that Cloud advances had an enormous effect in transit how we work together. The level of profitability and coordinated effort they conveyed to the table was, up until then, inconceivable. In this way, it ought not be that huge of an astonishment that, today, 92% of SMBs are utilizing no less than one cloud administration, while 87% of them are utilizing no less than one cloud framework arrangement. Still, it ought to be brought up that such mass appropriation, and extensive variety of administrations unavoidably leaves various expanding security gaps. Give us a chance to see a percentage of the most secure cloud benefits that ought to keep those openings from sinking your little business until the end of time.

Clear Skies Coming to The Cloud

April 12, 2016 No Comments

Over the last few years, cloud industry discussions have been largely about demystifying the trends versus hard and fast business benefits. It’s not that the value isn’t there, but every organization has its unique requirements and challenges when it comes to the cloud so it has taken some consideration and strategic planning to understand the business impact and value before moving towards broad implementation within the enterprise.

The Forrester Wave™: Hybrid Cloud Management Solutions, Q1 2016

April 7, 2016 No Comments

This report details our findings to help infrastructure and operations (I&O) professionals select the optimum private cloud solution. I&O pros can customize criteria weightings to align with their own private cloud initiative.

The Forrester Wave™: Private Cloud Software Suites, Q1 2016

April 7, 2016 No Comments

This report details our findings about how each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&o) professionals select the right partner for their hybrid cloud management needs.

Rapid Deployment of Integrated WebSphere Solutions in Your Cloud

April 6, 2016 No Comments

This paper demonstrates how to take an existing application that was built in a legacy environment, and bring that application to IBM PureApplication® Systems, using preferred practices for deployment and automation. The process is illustrated using a business scenario.

IT Forensics in the Cloud

March 31, 2016 No Comments

In 2013, 7 percent of U.S. based organizations reported a loss of $1 million or more, while 19 percent of organizations in the U.S. reported a loss of $50,000 or more, all stemming from the mishandling of computer network information either intentionally by cyber criminals or inadvertently by unsuspecting employees. When this happens, IT security, managers and department staff are then left with the daunting task of locating the source of the problem, which is often time-consuming and costly, especially in instances where financial loss has occurred due to data breach or theft.

How’s your Cloud Intelligence? BI or BS?

March 29, 2016 No Comments

Data analytics is something most of us crave, because we see immediate value by having information depicted in ways that provide deeper insights on something previously unknown. As we watch the US presidential candidates rise and fall on their campaign trails, the poll results roll in quickly, letting us know who is leading the pack and who is being pushed out. Data doesn’t lie. Regardless of where you sit on the political spectrum, the data gives near-instantaneous results on who’s in and who’s out. The media then can have a “field day” and we know what possibilities transpire after that.


Women in Technology Summit San Jose

TDWI Orlando 2015

Gartner Identity & Access Management Summit

Gartner Data Center Las Vegas

ITBriefcase Comparison Report

Cyber Security Exchange