Inside the Briefcase


Federating Identities for a Successful Enterprise IdP Deployment

Federating Identities for a Successful Enterprise IdP Deployment

by Lisa Grady, Radiant Logic
When customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security...

Protecting Your Data at Each Step of the Networking Path

Protecting Your Data at Each Step of the Networking Path

by Bill Manning, APC by Schneider Electric
As the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime.
Read More >>>





Briefcase Highlights


CLOUD COMPUTING

Cloud is SMBs Competitive Edge

November 13, 2014 No Comments

In today’s small business world, the common reasons why businesses fail are out-of-control growth, poor accounting and operational inefficiencies. Small businesses are constantly dealing with inefficient back-end processes that result in increased costs – as well as reduced employee productivity and revenue. Because of this, often times small businesses find it difficult to take on new projects as they do not know their financial standing, availability of resources or their pipeline in real-time.

2015 Cloud Hosting Predictions & Forecasts

November 12, 2014 No Comments

With 2015 right around the corner, now is a great time to identify what the big trends for next year are going to be in the world of cloud computing and virtualization. With growth across the board for cloud service providers this year – in compute and storage, archiving, messaging/email and specialized applications – we can expect more of the same in 2015. Here are some ideas for the larger trends taking shape for next year.

New IBM Entrepreneur Program Accelerates Collaborative Innovation in the Cloud

November 10, 2014 No Comments

IBM today announced the launch of the IBM Global Entrepreneur Program for Cloud Startups, which will help startups and entrepreneurs harness the power of IBM Cloud, as well as deeply connect and embed them into IBM’s vast global network of enterprise clients, consultants, Innovation Centers and more to rapidly build innovations, scale quickly and accelerate growth.

Metalogix Launches Cloud Acceleration Suite and Partner Program to Help Clients Rapidly Migrate Email, Files and SharePoint to Any Cloud

November 6, 2014 No Comments

Today Metalogix announced the launch of the Cloud Acceleration Suite and Partner Program to help clients successfully deploy collaboration capabilities in the cloud platform of their choice, including Microsoft Office 365, Microsoft Azure, Amazon Web Services, and hybrid and private cloud. The program brings together Metalogix’ trusted migration and management tools for mission-critical collaboration platforms.

How to Navigate Data into the Cloud

October 31, 2014 No Comments

By Dave Wagner, TeamQuestThe increase in businesses moving their data into the cloud has created several new challenges for data center managers. Many departments and employees are increasingly using the public cloud to host unpredictable applications with unknown resource requirements. Read More >>>

Infographic: Revolutionize Cloud Backup

October 22, 2014 No Comments

The traditional model of multi-tiered server backup is highly inefficient, often involving backups to staging servers, tapes and off-site long-term archives. Phoenix eliminates these inefficiencies with a high-performance, born-in-the-cloud solution that’s built for today’s enterprise needs and engineered to be future-proof.

BYOD: California Court Decides Who’s Wearing the Pants

October 22, 2014 No Comments

The workplace trend of BYOD (Bring Your Own Device) is nothing new. What remains unclear, however, is the burden of ownership, cost and security. When employees bring their own cell phones, laptops or tablets to work, there’s a fair chance they’ve personally purchased those devices—data plans and all. In fact, some employers today require a BYOD policy, with no intention of paying for any of it. As one CIO bluntly put it, “Well, we don’t buy their pants either, but they’re required for the office.”

It’s Time to Go All-in on the Cloud

October 22, 2014 1 Comment

By Joe Manuele, AvayaToday, enterprises and their IT departments are migrating to cloud services faster than ever before. In fact, no other technology in our industry is associated with such dramatic triple-digit growth as cloud. By 2020, the cloud computing industry will be a $40 billion market. Read More >>>

Fishing for Data in a Digitalized Tourism Industry

October 22, 2014 No Comments

By Yves de Montcheuil, TalendAmong the most digitalized industries, travel and hospitality is changing fast. Travel agents, airlines, airports, hotel chains – the entire industry is fishing for value in a seemingly-unlimited ocean of data. Read More >>>

Five Best Practices for Backing up the Cloud

October 20, 2014 No Comments

Despite their falling costs and usually stellar security, recent large-scale data breaches showcase some of the cloud’s vulnerability, so firms should be careful about storing large amounts of customer data within the cloud. Another drawback with the cloud can be the issues that arrive when there isn’t reliable Internet connectivity. You can access data from an external drive if you have it with you, but you can’t pull from the cloud without Internet access. Many cloud services also make it possible to have mistakes occur.

The Internet of Things Won’t Take Off Until These 3 Things Happen

October 15, 2014 No Comments

by Rob Vandenberg, Lingotekf your smartphone can’t read your mind yet, it will soon. Innovators and early adopters are sprinting towards the dream of a connected world, connecting everything from cars to toasters. Their exuberance is contagious. Read More >>>

Federating Identities for a Successful Enterprise IdP Deployment

October 15, 2014 No Comments

by Lisa Grady, Radiant LogicWhen customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security but also productivity and simplicity for your users. Read More >>>

Sophos Advances Cloud Mobile, and Web Security with Acquisition of Mojave Networks

October 7, 2014 No Comments

Sophos today announced that it has acquired cloud-based security firm Mojave Networks of San Mateo, Calif. This acquisition will strengthen Sophos cloud-managed and appliance-based security solutions. To Sophos Cloud, an integrated cloud-managed security offering, Mojave will add a rich cloud-based web security solution. And to Sophos’ line of network security hardware it will enable hybrid deployment options (SaaS and non-SaaS) to meet diverse web security needs.

8 Excellent Benefits of Using Cloud Computing

October 6, 2014 No Comments

Cloud computing has become the new benchmark in the world of technology, and has become one of the favorites for businesses across the world. This technology is growing by leaps and bound. What started on a small scale is today a whooping $45 billion industry worldwide.

Got Big Data Problems? So Do Most Companies…

September 25, 2014 No Comments

Data analytics is not a new concept, but why are today’s businesses still grasping at how to use this information source to create more efficient and effective businesses? A recent survey by Lavastorm Analytics of 495 analytics professionals and C-level executives looked at current analytic usage, trends and future initiatives of businesses when it comes to big data solutions. What we uncovered is that most businesses are not fully harnessing big data analytics benefits, even though more than half of those surveyed are rapidly growing their investment in analytics tools.

Internet Safety by Top IT Security Experts

September 25, 2014 No Comments

The recent string of media reports about phishing or email password hacking security breeches,like the iCloud celebrity nude picture leak, have caused a media frenzy. This particular case received worldwide attention because the leak involved celebrities. However the reality is that email hacking happens all the time in personal and professional email accounts.

Why VMI is the future for our BYOD Generation

September 24, 2014 No Comments

While many approaches are being used to control the impact of the mobile age on IT, VMI technology shows your organization can both embrace and thrive in this new world.

Case Study: Box is a critical component in Rosetta Stone’s new cloud strategy.

September 23, 2014 No Comments

Download this white paper and see how Rosetta Stone’s files are no longer stored on-premise in Tokyo, San Francisco, or any of the company’s offices.

How Storage Infrastructure Can Help You Differentiate and Add Value to Your Cloud Storage Services

September 22, 2014 No Comments

This roundtable discussion with a successful Service Provider and an IBM expert offers great insights on how the right choice of infrastructure impacts your ability to deliver on those expectations.

Protecting Your Data at Each Step of the Networking Path

September 18, 2014 No Comments

by Bill Manning, APC by Schneider ElectricAs the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime. Read More >>>

Panaya Enables Greater Agility in ERP Changes with Big Data Analytics

September 18, 2014 No Comments

Panaya is proud to announce the launch of Panaya CloudQuality™ Suite, a cloud-based SaaS that provides a suite of services needed to deploy changes in ERP systems. From day-to-day changes to the most complicated upgrades, Panaya CloudQuality™ suite applies big data analytics to predict what will break, how to fix it and what to test for every change made.

FireLayers Enables Secure Cloud Application Usage

September 18, 2014 No Comments

The shift to the cloud has been tectonic; however, the IT infrastructures of the last 20 years have not kept pace to adequately protect enterprise networks, data and transactions. Applications are moving to the cloud, so must the corporate security gateway. Enterprises need a cloud application security gateway.

The Four Phases of Cloud Optimization

September 12, 2014 No Comments

with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>

Transform your IT department into a self-service cloud application provider with IBM Cloud Orchestrator

September 9, 2014 No Comments

According to a Forrester survey of Fortune 1000 IT leaders, 83% do not think they deliver cloud services fast enough. The problem lies within finding the right balance between system optimization and innovation.

Simplifying Cloud Enabled Enterprise Environments

September 9, 2014 No Comments



Join us for this webcast and learn how Ubuntu’s orchestration and deployment tools work on all clouds to drive simplicity and quick return on investment.

State of the Art of Single System Availability Report

September 9, 2014 No Comments

Almost every enterprise has a set of systems running workloads that need to be highly available (such as CRM or ERP). If these types of applications fail for a significant amount of time, an organization might find itself making the evening news.

How far is too far when it comes to outsourcing IT?

September 8, 2014 No Comments

with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>

You Can’t Win the Data Loss Blame Game – So End It

September 3, 2014 No Comments

By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>

Raising the game – The IBM Business Tech Trends Study

August 26, 2014 No Comments

IBM has evaluated the current adoption landscape of 4 key technologies in the enterprise: Big Data & Analytics, Cloud, Mobile and Social

Tata Consultancy Services and Cloudera Join Forces to Deliver Big Data and Analytics Services Globally

August 26, 2014 No Comments

Partnership Helps Customers Fully Harness Big Data by Implementing Cloudera Enterprise Data Hub

ADVERTISEMENT

TDWI

Gartner Identity & Access

Gartner Data Center

Red Hat JBoss Busines Automate

ACI Customer Experience Management Summit

ManageEngine

ITBriefcase Comparison Report

IBM Data