Inside the Briefcase

Briefcase Highlights


IT Briefcase Exclusive Interview: BYOD Planning with an Eye for the Future

July 30, 2015 No Comments

with Israel Lifshitz, NuboIf you’ve been tracking the evolution of our BYOD work culture, you’ll know that most enterprises are at some stage of getting a grip on a myriad of issues, including employee adoption, compliance, Shadow IT and user privacy just to name a few. Read More >>>

Will Windows 10 bring revival to its mobile platform?

July 29, 2015 No Comments

With the release of Windows 10 comes another opportunity for Microsoft to align its direction for mobile to better serve developers and IT departments. Together with a subtle name change to Windows 10 Mobile, Microsoft is looking to draw a line in the sand on its failed attempt to chase Apple in the consumer market with Windows Phone.

The Internet of Things: Challenges and Opportunities Across Industries

July 28, 2015 No Comments

with Sam Ganga, DMIZK Research reports that the Internet of Things (IoT) will have 50 billion endpoints by 2010 and will create 2.5 trillion new revenue streams in the next 10 years. That represents a huge opportunity for organizations large and small across all industries. Read More >>>

Capturing Packets Faster in the 100Gbps World

July 27, 2015 No Comments

by Daniel Joseph Barry, NapatechThe number of network end points is growing into the billions as the Internet of Things (IoT) expands its presence, spurred on inexpensive sensors, the rapid adoption of mobile devices and innovative minds. This presents engineers and administrators with the challenge of managing and protecting the network in real time. Read More >>>

Requirements Customers Have For Mobile Payments

July 22, 2015 No Comments

by Kristen Gramigna, BluePayMobile payments can equip small businesses to accept payment by credit or debit card, using the mobile device that small-business owners likely have within reach most of the time. While mobile payment technology can benefit both customer and business owner, some customers remain hesitant about them. Read More >>>

Establishing a Foundation for Enterprise Security Policy in the Public Cloud

July 9, 2015 No Comments

In many respects, Cloud Access Security Brokers are the future of what we currently know as the data center firewall. How so? A data center firewall sits in front of enterprise applications/databases (systems of record) in the data center, providing control and visibility. Increasingly, those applications and databases are moving from the corporate data center to the public cloud – with apps like Office 365, Box, and Salesforce, quickly becoming the norm in the enterprise. In this context, cloud apps become the new system of record. Since the traditional data center firewall can’t see cloud traffic, it can no longer provide the protection that we need.

Migrating to the Cloud? Pave the Way For Dynamic Infrastructure With Effective Planning

July 8, 2015 No Comments

Cloud migration remains a challenge for businesses. According to a June 9th article from Cloud Pro, reporting on a recent Cloud Industry Forum study, just 10 percent of all senior IT professionals asked said their migration “could not have been improved.” The sheer complexity of moving to the cloud proved troublesome for 38 percent of respondents, and 30 percent had issues with data sovereignty.

IT Briefcase Exclusive Interview with Learning@Cisco: New Training Needed to Manage the Internet of Everything

July 2, 2015 No Comments

with Tejas Vashi, Learning@CiscoThe Internet of Everything (IoE) is bringing together people, process, data and things to make networked connections more relevant and valuable than ever before. Understandably, this is accelerating the pace of digital transformation. Read More >>>

Top 5 Cloud Computing Solutions For Small Business

June 29, 2015 No Comments

Cloud computing solutions can add tremendous value to your small business. Many times disaster strikes when devices are lost during travel or servers go down. It is difficult to gauge whether or not you will be able to access or recover your company data under such circumstances. Whether you’ve just spilled a morning coffee or lost your work tablet all together, cloud computing solutions will always have your data stored and accessible 24/7. Cloud services can be seen as external hard drives that do not require hardware.

Elevate Your Business with the Cloud

June 29, 2015 No Comments

The cloud isn’t just a buzzword for the boardroom – it’s the metaphor used to describe the vast array of connected services that are changing the way businesses work. It’s a metaphor that’s driving a revolution, and if you haven’t included cloud-based services in your business model yet, you’ve already got some catching up to do.

Your Mobile Wallet Isn’t Safe

June 29, 2015 No Comments

with Dror Nadler, CellroxAs mobile payments barrel forward like a freight train, the potential consequences of cyber breaches grow in severity. 30 percent of U.S. shoppers already use mobile wallets, and 62 percent of shoppers who don’t use a mobile wallet expect to adopt one in the next year, according to a 2015 report from Interactions marketing group. Read More >>>

Benefits of using the private cloud in the public sector: Why sensitive data should never be stored on a personal server

June 23, 2015 No Comments

Whether an enterprise or government entity, the proliferation of BYOD has propelled data security to the forefront of just about any organization with a digital footprint. This is of particular concern to public sector IT where security and reliability are critical for managing and safeguarding sensitive data. The problem is compounded when you factor in the tendency of employees to cross-contaminate their devices with both personal and work-specific communications. As such, sensitive data should never be stored on a personal server, which can be more easily breached.

U.S. Open Primer: In the Cloud or on the Golf Course, Hazards Can Be Devastating

June 22, 2015 No Comments

This week, the U.S. Open heads to the Pacific Northwest for the very first time. Chambers Bay Golf Course in Washington State will play host. Anyone familiar with this course knows “there aren’t traditional golf hazards, like water and trees, but there is trouble everywhere at Chambers Bay” says one sports blogger.

How To Drive Success In The Cloud: Secrets To Boosting Adoption

June 18, 2015 No Comments

Cultivating employee buy-in is a prime concern of managers any time a new tool or process is implemented. The more resistance an initiative faces, the more likely it is to ultimately fail.The path to increased efficiency isn’t always smooth, often requiring nudges to help people get out of their comfort zones and move forward.

Corporate Cloud Computing Trends Survey Results

June 11, 2015 No Comments

A March survey of 1,593 members of the 451 Global Digital Infrastructure Alliance looked at cloud computing and other key IT market trends, including enterprise adoption of cloud, IT budgets and spending, and customer satisfaction with leading Infrastructure-as-a-Service (IaaS), Hosted Private and On-Premises Private Cloud vendors.

IT Briefcase Exclusive Interview with Napatech: What the Third Platform Requires of the Network

June 3, 2015 No Comments

Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry, VP Positioning and Chief Evangelist for Napatech, speaks with IT Briefcase about the emerging technology of software acceleration platforms and tools.Read More >>>

Infographic: CTERA 2015 Enterprise Cloud Storage Survey

June 2, 2015 No Comments

Are enterprises boldly going where no enterprise has gone before? For the second year running, we’re excited to share the results of our annual Enterprise Cloud Storage Survey. Expanded this year to include 300 respondents, the survey results show that enterprises are aware and wary of file sharing in the cloud when done without policy and IT control. At the same time, we see growing adoption of private and hosted private (or virtual private) architectures to address security and privacy concerns.

Infographic: 7 Chilling Truths of Cloud Cybersecurity

May 28, 2015 No Comments

Check out this informative Infographic on Cloud Security!

IT Briefcase Exclusive Interview: Weighing the Options for Mobile Design in a Google-centric World

May 26, 2015 No Comments

with Sam Ganga, DMIIn this interview, Sam Ganga at DMI speaks with IT Briefcase on the three fastest-growing trends for addressing ecommerce through the mobile web and provide the pros and cons of each. Read More >>>

Adobe Cloud Security White Paper

May 18, 2015 No Comments

Adobe Document Cloud enables the workforce to increase productivity while staying secure.

Investing in Current Infrastructure or Migrating to Cloud-Based Managed Services?

May 18, 2015 No Comments

In 2013, Scandinavian research group SINTEF announced that 90 percent of all data ever created was generated during the two previous years. That time frame continues shrink as the rate of data creation increases exponentially. Mobile devices, computers, gaming systems and even your car all produce terabytes and terabytes of data. Under these conditions, every business needs to think seriously about their cloud options.

Don’t Get Lost in the Cloud: 10 Tips for Controlling Cloud Data

May 13, 2015 No Comments

by Gerry Grealish, PerspecsysWith information flowing more freely than ever in today’s digital economy, tracking sensitive data becomes an increasingly difficult task. In fact, findings from a recent study show more than half of IT professionals admit not having a complete picture of where their sensitive data lives. Read More >>>

4 Steps to Making a Smart Transition to the Cloud

May 11, 2015 No Comments

by Chris Unruh, Grant Thornton LLPDuring the past several years, cloud-based business applications and solutions have emerged as the next frontier for the IT function. The cloud has the potential to transform the way companies operate and enable businesses to access world-class software with little upfront cost. Read More >>>

Consumers Need an Education in Online Shopping Security 101

April 30, 2015 No Comments

by Robin Alden, Comodo CA Ltd.You place so much time and effort into the design and content of your website to increase its “stickiness” and turn online browsers into buyers, and with good reason. Consumers are increasingly doing more of their shopping online while doing so on a wide variety of devices with different screen sizes. Read More >>>

Eight Realities That Demand Multi-Factor Authentication

April 30, 2015 No Comments

by David Hald, SMS PASSCODESecurity is part and parcel of an IT admin’s job duties, but it is just one of a long litany of must-do’s that crowd each day. They put the basics in place, including antivirus software, passwords and firewalls, and then turn their attention to the latest priority or malfunction. Read More >>>

Another Dark Side of the Cloud: Data Center Migrations

April 23, 2015 No Comments

As business units and IT organizations move to the use of public cloud services, crucial application details often go missing. Some groups might not be particularly concerned by this. After all, as long as your application still performs well, why track the specific hardware used to support it? In the age of service level agreements and shared, multitenant architectures, does it really matter anymore if you know the physical server, storage system or network supporting your application as long as application performance meets users’ service level needs?

5 iPhone Reading Apps You Won’t Want To Miss

April 22, 2015 No Comments

Are you just getting on the e-reading bandwagon after all this time? Perhaps you want to test it out instead of investing in an e-reader right away. Whether you have an iPad or Nook tablet there is something out there for everyone. Whatever the case may be, you can test how you like this new found hobby by using your iPhone on the go. And with the widely available reading apps for iOS, you just might fall in love with one of them.

7 Steps to Securely Deploy Cloud Apps

April 22, 2015 No Comments

by Chip Epps, OneLogin Gartner predicts the number of cloud-provisioned office system users will grow 28.5% a year to 695 million users by 2022 –constituting 60% of the user universe that will exist by then. Read More >>>

Comindware selected as one of Top 20 Most Promising BPM Technology Solution Providers

April 21, 2015 No Comments

Comindware® ( – a leading provider of cloud-based Enterprise Work Management solutions has been selected as one of the Top 20 Most Promising BPM Technology Solution Providers by CIO Reviewin 2015. The CIO Review editorial board comprised CEOs, CIOs, CMOs and industry analysts who reviewed the finalists by various parameters such as impact on the market, product differentiation, ability to execute and other criteria.

Using Dropbox? Get Ready for Spring Cleaning!

April 8, 2015 No Comments

by Paul Castiglione, IpswitchApril is finally here and that means IT teams, like everyone else, will be busy with their spring cleaning projects. While spring cleaning your house is a pretty straightforward endeavor, spring cleaning your files can be a lot more complicated. Read More >>>


TDWI Boston

Big Data Tech Con

Gartner BPM Summit

American Customer Festival



Red Hat JBoss Busines Automate

Cyber Security Exchange

ITBriefcase Comparison Report