Inside the Briefcase






Briefcase Highlights


CLOUD COMPUTING

10 Tips for Protecting Data in the Cloud

May 3, 2016 No Comments

DON’T GET LOST IN THE CLOUD – You can’t just write off cloud services due to security concerns. Get solid advice here.

Cloud Security Report

May 3, 2016 No Comments

In this report, you will gain a greater understanding of how industry and online presence drive your threat profile, how the Cyber Kill Chain construct drives understanding, and get recommendations on how to improve your security posture.

Top 5 Businesses that Can Benefit Most from Cloud Computing

May 2, 2016 No Comments

As time goes by, Cloud computing is taking on greater roles in the world of business which leads many to wonder why more companies aren’t taking advantage of the many benefits inherent in this type of technology. Unfortunately, the reason for this is probably based on the fact that few people actually have a sound understanding of what it means to work in the Cloud.

Forrester Market Overview: Use Project Services To Accelerate Infrastructure Transformation

May 2, 2016 No Comments

The pace of digital transformation and cloud migration is forcing IT professionals to review their current infrastructure and force change to accommodate new business demands brought on by the age of the customer. Many organizations are motivated by fear, such as of the potential business disruption in their industries from new digital startups like airbnb or uber; more optimistically, they’re motivated by the opportunities brought by digital technologies to improve their customers’ experience.

Scale-Out NAS: Best Practices to Implement Tomorrow’s Storage Today

April 29, 2016 No Comments

by Stefan Bernbo, CompuverdeAs the data deluge continues on unabated, vertically scaling legacy approaches to storage are falling short. Organizations need to find a way to store high volumes of data without busting the budget, all while maintaining high levels of performance… Read More >>>

Gartner MQ on Disaster Recovery as a Service

April 29, 2016 No Comments

Among providers of disaster recovery as a service there is wide variance in experience and service quality, together with other key differentiating factors. Data center managers should use this Magic Quadrant to help them evaluate providers of DRaaS services.

IT Briefcase Exclusive Interview: The rise of cloud application control technology

April 26, 2016 No Comments

with Ed Macnair, CEO, CensorNetIn this interview, Ed Macnair, CEO of CensorNet, speaks with IT Briefcase on how security technologies needs to evolve to meet the challenge and opportunities of cloud computing.Read More >>>

The Forrester Wave™: Hybrid Cloud Management Solutions, Q1 2016

April 19, 2016 No Comments

In Forrester’s 40-criteria evaluation of private cloud solution vendors, we identified the nine most significant software providers — BMC Software, Cisco Systems, Citrix, Hewlett Packard Enterprise, Huawei, IBM, Microsoft, Red Hat, and VMware — in the category and researched, analyzed, and scored them.

The Forrester Wave™: Private Cloud Software Suites, Q1 2016

April 19, 2016 No Comments

In Forrester’s 32-criteria evaluation of hybrid cloud management solution vendors, we identified 11 significant software providers — BMC Software, Citrix, CliQr Technologies, Dell, Hewlett Packard Enterprise, IBM, Microsoft, Red Hat, RightScale, Scalr, and VMware — in the category and researched, analyzed, and scored them.

Fog Computing: The Imminent Future of the IoT

April 18, 2016 No Comments

While the Internet of Things continues to present a mind bending concept, which we are more or less witnessing in this phase of development, hardly anyone argues about the back end conditions of this notion. The question of storing the amount of data for 22 billion devices total, and how our cloud platforms will actually compute by the end of the year 2018, remains a little bit foggy.

Most secure Cloud Services for Your Small Businesses

April 15, 2016 No Comments

There is no denying that Cloud advances had an enormous effect in transit how we work together. The level of profitability and coordinated effort they conveyed to the table was, up until then, inconceivable. In this way, it ought not be that huge of an astonishment that, today, 92% of SMBs are utilizing no less than one cloud administration, while 87% of them are utilizing no less than one cloud framework arrangement. Still, it ought to be brought up that such mass appropriation, and extensive variety of administrations unavoidably leaves various expanding security gaps. Give us a chance to see a percentage of the most secure cloud benefits that ought to keep those openings from sinking your little business until the end of time.

Clear Skies Coming to The Cloud

April 12, 2016 No Comments

Over the last few years, cloud industry discussions have been largely about demystifying the trends versus hard and fast business benefits. It’s not that the value isn’t there, but every organization has its unique requirements and challenges when it comes to the cloud so it has taken some consideration and strategic planning to understand the business impact and value before moving towards broad implementation within the enterprise.

The Forrester Wave™: Hybrid Cloud Management Solutions, Q1 2016

April 7, 2016 No Comments

This report details our findings to help infrastructure and operations (I&O) professionals select the optimum private cloud solution. I&O pros can customize criteria weightings to align with their own private cloud initiative.

The Forrester Wave™: Private Cloud Software Suites, Q1 2016

April 7, 2016 No Comments

This report details our findings about how each vendor fulfills our criteria and where they stand in relation to each other to help infrastructure and operations (I&o) professionals select the right partner for their hybrid cloud management needs.

Rapid Deployment of Integrated WebSphere Solutions in Your Cloud

April 6, 2016 No Comments

This paper demonstrates how to take an existing application that was built in a legacy environment, and bring that application to IBM PureApplication® Systems, using preferred practices for deployment and automation. The process is illustrated using a business scenario.

IT Forensics in the Cloud

March 31, 2016 No Comments

In 2013, 7 percent of U.S. based organizations reported a loss of $1 million or more, while 19 percent of organizations in the U.S. reported a loss of $50,000 or more, all stemming from the mishandling of computer network information either intentionally by cyber criminals or inadvertently by unsuspecting employees. When this happens, IT security, managers and department staff are then left with the daunting task of locating the source of the problem, which is often time-consuming and costly, especially in instances where financial loss has occurred due to data breach or theft.

How’s your Cloud Intelligence? BI or BS?

March 29, 2016 No Comments

Data analytics is something most of us crave, because we see immediate value by having information depicted in ways that provide deeper insights on something previously unknown. As we watch the US presidential candidates rise and fall on their campaign trails, the poll results roll in quickly, letting us know who is leading the pack and who is being pushed out. Data doesn’t lie. Regardless of where you sit on the political spectrum, the data gives near-instantaneous results on who’s in and who’s out. The media then can have a “field day” and we know what possibilities transpire after that.

Always On: The Rise of Cloud Computing

March 24, 2016 No Comments

The cloud market is expanding. Public clouds are yielding ground to private and hybrid alternatives, while niche startups are discovering ways to advance cloud storage, security and access. For many companies, however, the current cloud landscape is both convoluted and confusing — what’s really happening, how did we get here, and what does the future hold? Make sense of the market with a quick look at the rise — and future — of cloud computing.

3 Insights about Enterprise Cloud Security in 2016

March 22, 2016 No Comments

The public’s perception of the Cloud seems to change constantly. In light of high-profile security breaches at Target (2013) and Home Depot (2014) and in the iCloud (2014), many users raised concerns about privacy and data security. Even with recent technological advances, thoughts on cloud security remain mixed. In fact, while 64 percent of medium and large enterprises believe cloud infrastructure is more secure than legacy systems, 31 percent also deem security the most prominent challenge they encountered in 2015, according to a study on the state of cloud security in the enterprise market.

The Cloud And Health Care IT: What You Need To Know

March 18, 2016 No Comments

According to Healthcare IT News, more than 80 percent of doctors now use electronic health records (EHRs) to create, store and transfer patient data. Many EHR systems rely on cloud computing rather than local stacks to both increase the speed of collaboration and reduce the strain on local servers. For health care agencies, however, moving to the cloud comes with significant organizational challenges in addition to big benefits. Here’s what you need to know about three of the most common.

IT Briefcase Exclusive Interview: Top Skills Needed to Manage Hybrid IT Environments

March 14, 2016 No Comments

with Kong Yang, SolarWindsIn this interview, Kong Yang, Head Geek and technical product manager at SolarWinds, speaks with IT Briefcase on how hybrid environments are changing the role of the IT professional. Read More >>>

Overcoming the IoT’s Security Challenges

March 9, 2016 No Comments

Governments, utilities and businesses from every sector are embracing the possibilities of the Internet of Things (IoT). This interconnected environment promises safer public parks, more efficient factories, better healthcare – imagination seems to be the only limit when it comes to applying the IoT to today’s needs. However, for the positive action of all these improvements to work and life, there is at least an equal negative reaction. Gartner analysts recently revealed that by 2020, firms will have increased annual security budgets by 20 percent (up from less than one percent in 2015) in order to address security compromises in the IoT.

Using the Cloud to Improve Business Resilience

March 2, 2016 No Comments

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions. This whitepaper outlines how organizations today can use cloud computing in more innovative ways: to run mission-critical production workloads, to analyze big data for true business insight, and to develop and manage mobile applications.

Redefining Networks for Cloud, Analytics, Mobile and Social

March 2, 2016 No Comments

This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks.

Understanding Cloud Desktop and its Many Benefits

February 29, 2016 No Comments

A majority of businesses are moving critical applications from physical personal computers to the virtual environment. A 2015 IT priorities survey confirms this where 76% of the IT decision makers surveyed indicated their preference for cloud bases productivity applications. About 57% stated they would roll out enterprise file sharing and synching services on the cloud.

Is IT Prepared for the Changes in Enterprise Mobility?

February 29, 2016 No Comments

Mobile devices are quickly becoming the primary devices among enterprises. Their great user experience, increased computing capabilities, explosion of apps, and always-on connectivity combined with agility, make them ideal replacements for PCs. Mobility these days, is not just a tool enabling employees access to email and a handful of corporate applications, but rather a tool to improve employee productivity and ease of working by enabling them with real-time connectivity to customers, partners, suppliers and workers.

Are You Prepared for the Top Three Compliance Issues?

February 26, 2016 No Comments

by Fouad Khalil, SSH Communications SecurityNo matter what an enterprise’s major market is, it is probably subject to regulatory compliance requirements, such as PCI, SOX, FISMA and HIPAA. PCI requirements in particular demand a high level of auditability and controls. Read More >>>

Five IT Trends That Will Mold Business This Year

February 26, 2016 No Comments

The field of information technology (IT) has evolved significantly over the past several years. As IT leaders work to develop strategies for 2016, analytics, cloud computing and cyber security are major areas of focus. Forbes’ Peter High predicts that the latest in technologies will have a “significant impact” on the way companies operate over the next several years. To inform your IT road map for the months to come, here are five IT trends that will revolutionize the way businesses define productivity, customer communications and more.

The IoT Is Reinventing Manufacturing

February 18, 2016 No Comments

No longer a catchphrase or a vague notion, the Internet of Things is in full swing. McKinsey & Company estimates that the IoT has a total potential economic impact of $3.9 trillion to $11.1 trillion a year by 2025. Manufacturers are already spending considerable amounts of money on mobilizing the enterprise, including connecting employees, products, services and machines/vehicles. Digging deeper, we can see what functions in the business they’ve tackled first.

FAQs about Protecting Data in the Cloud… from Blue Coat.

February 16, 2016 No Comments

Download this white paper to learn some basic cloud security components.

ADVERTISEMENT

Women in Technology Summit San Jose

TDWI Orlando 2015

Gartner Identity & Access Management Summit

Gartner Data Center Las Vegas

ITBriefcase Comparison Report

Cyber Security Exchange