Inside the Briefcase






Briefcase Highlights


DATA and ANALYTICS 

Best Practices for Efficiently Preventing and Managing Incidents

May 26, 2016 No Comments

There are few things worse for an IT Operations executive than a mission-critical application outage. The operations team must address it immediately, and as the clock ticks, the bottom line shrinks. The pressure is on to reduce the mean time to repair (MTTR), but when the application is up again, it’s time to consider how this fire drill could have been avoided.

SIEM in the Age of Digital Transformation

May 26, 2016 No Comments

As digital transformation and the Internet of Things (IoT) gain momentum, enterprises will be exposed to new forms of incoming data and external connections that can potentially create pinholes in existing network security environments. Meanwhile, network and security operations teams are struggling to gain visibility into the landscape while attempting to manage and secure any number of moving endpoints and analyze trends and anomalies in real time – a monumental challenge, to say the least.

Finding Value in Your Unstructured Data

May 24, 2016 No Comments

It can be a challenge to find value in data that’s without structure. Rather than let this information sit unused in a dark silo, enterprises can gather valuable customer insights with a bit of out-of-the-box thinking and the right tools for the job. Not only is data left ‘in the dark’ a waste of company resources given the ever-increasing costs of data storage, it defeats the purpose of collecting customer information entirely if not capitalized on to further company-wide action.

It’s 12 O’Clock – Do You Know Where Your Data Is?

May 23, 2016 No Comments

It’s estimated that 90 percent of the world’s data has been created in the last two years. Data is flowing in a virtual avalanche that will likely only continue in volume and speed. It flows between colleagues and work groups and among the proliferation of network and cloud repositories. The ease and convenience of data sharing today means that your sensitive data could be anywhere. Collaboration is a pivotal component of business, but it must be tempered by the need for data protection.

Six Things You Didn’t Know About Your Company’s Cloud Apps

May 23, 2016 No Comments

When building a cloud app security strategy, it’s easy for most IT leaders within a company to assume that blocking all risky file sharing apps is the answer. It’s an understandable assumption to make, given that 91 percent of apps aren’t enterprise-ready and lack in important areas like security and privacy, according to Netskope’s latest cloud report.

Why Simplicity is Key to Scale

May 23, 2016 No Comments

That one sentence can strike a sense of helplessness – or even fear – into the hearts of technology executives everywhere. And it should, because changes in technological approaches can be time consuming, expensive and may even require breaking down years and years of legacy processes and equipment—not to mention the headaches that arise with the implementation of new technology.

How To Do Enterprise Security like Bond…James Bond

May 17, 2016 No Comments

In the era of crippling state-sponsored hacks, cybercrime rings and data breaches, businesses are looking at all forms of preventative measures to keep attackers at bay. Even a modern-day James Bond would find it challenging to keep his data, and identity, a secret in the Information Age. And unlike in the famous films, the real-life ‘villains’ capable of stealing trade secrets, personal information and other forms of sensitive data are oftentimes anonymous and numerous. Reports estimated more than 317 million new pieces of malware were created within 2015 alone. Imagine what they can do today!

IT Briefcase Exclusive Interview: Understanding the Evolution of Enterprise Mobility

May 16, 2016 No Comments

with Wes Gyure, IBM SoftwareIn this interview, Wes Gyure, MaaS360 Portfolio Offering Manager, IBM, helps us understand the evolution of enterprise mobility and the challenges organizations are facing as they look to enable their mobile workforce. Read More >>>

Big Data And E-Commerce: Making The Most Of New Insights

May 13, 2016 No Comments

The e-commerce market is growing, averaging a 250-percent increase per year. However, just 8 percent of all product page traffic converts to sales — in other words, it’s still a challenge for retailers to move past the research stage and convince users to “buy now.” One way to improve e-commerce is through the use of big data. Here’s a look at how you can leverage new insights to boost your bottom line.

The Ins and Outs of TLS Encryption

May 11, 2016 No Comments

Transport Layer Security (TLS) is a protocol that offers a high level of security to help authenticate and encrypt information between a client and server for both inbound and outbound email (and website) traffic. Encryption protocols such as TLS help create secure connections for communications that must transfer across unsecured networks. Although there are others, SSL and TLS are two of the most popular security protocols of their kind.

Using Big Data in Small Ways for Huge ROI in SEO

May 10, 2016 No Comments

We create 2.5 quintillion (a trillion billion) data bytes every day. And, 90 percent of the data in the world was created in just the last few years. Big Data has become so big that we need new avenues of artificial intelligence research, such as machine learning and natural language processing, to begin to sort out the information. Current Big Data technology, such as Hadoop and Big Data SQL, allows users to process and understand data better.

Webcast: The Phantom Identity Menace

May 10, 2016 No Comments

Attackers are moving away from direct assault, and instead are hijacking and exploiting user credentials to thwart security tools, and gain easy access to business data. How can you strike back and stop breaches that attack your users far, far away?

Webcast: They have all our passwords. It’s time for MFA everywhere.

May 10, 2016 No Comments

Let’s face it. With so many credentials having been compromised and made available to attackers, password-based security is no longer effective. We know that eliminating passwords is the right thing to do, but that takes time, and the bad guys are already inside our networks.

Who Moved My Secure Perimeter

May 10, 2016 No Comments

In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. Read this white paper to learn more.

5 Steps to Improve Your Software Supply Chain Security

May 9, 2016 No Comments

To improve management of component vulnerabilities, consider these five steps, which mimic a number of the supply chain management concepts originated by quality guru W. Edwards Deming to improve quality, accelerate feedback loops, and increase efficiencies of manufacturing operations.

IT Briefcase Exclusive Interview: Steps for Successful VDI Implementation

May 6, 2016 No Comments

with Jeremy Moskowitz, Founder and CEO, PolicyPak SoftwareIn this interview, Jeremy Moskowitz, founder and CEO of PolicyPak, speaks with IT Briefcase on the challenges and opportunities of using a virtual desktop infrastructure (VDI.)Read More >>>

SAP Hybris Premium Eyewear Customer Success Story

May 5, 2016 No Comments

In this new omnichannel world, simply ordering a standalone ecommerce channel isn’t enough. Companies need a platform that unites their channels and supports a more fluid model of customer engagement.

Pragiti Premium Eyewear Customer Success Story

May 5, 2016 No Comments

A popular eyewear company wanted a unique ecommerce channel designed exclusively for this market segment to promote and sell the products that aren’t available to the general public.

With Mozilla Persona on Its Deathbed, Where Is Identity Management Heading?

May 2, 2016 No Comments

Five years ago, Mozilla launched its new identity management system, Persona (originally called BrowserID). At the time, a sense of optimism was in the air. Everyone thought that the new technology would ease the strain of remembering numerous passwords to gain access to various websites. The alternative — outsourcing unified identity management to social media giants including Twitter, Facebook and Google — raised data privacy and reliability concerns. So everyone hoped that Persona would emerge as a strong unified authentication system and a credible alternative.

Forrester Market Overview: Use Project Services To Accelerate Infrastructure Transformation

May 2, 2016 No Comments

The pace of digital transformation and cloud migration is forcing IT professionals to review their current infrastructure and force change to accommodate new business demands brought on by the age of the customer. Many organizations are motivated by fear, such as of the potential business disruption in their industries from new digital startups like airbnb or uber; more optimistically, they’re motivated by the opportunities brought by digital technologies to improve their customers’ experience.

Scale-Out NAS: Best Practices to Implement Tomorrow’s Storage Today

April 29, 2016 No Comments

by Stefan Bernbo, CompuverdeAs the data deluge continues on unabated, vertically scaling legacy approaches to storage are falling short. Organizations need to find a way to store high volumes of data without busting the budget, all while maintaining high levels of performance… Read More >>>

Gartner MQ on Disaster Recovery as a Service

April 29, 2016 No Comments

Among providers of disaster recovery as a service there is wide variance in experience and service quality, together with other key differentiating factors. Data center managers should use this Magic Quadrant to help them evaluate providers of DRaaS services.

13 Essential Log Management Sources: Infographic

April 28, 2016 No Comments

Presented here is a list of log collections and alerts that can help support the infrastructure security of an automated log management system.

Aberdeen Report: What Drives Success for Best-in-Class Product Developers?

April 28, 2016 No Comments

Based on the experiences of 148 respondents, this report will explore what makes a product development company successful. It will look at the differences between the Best-in-Class and their competitors.

6 barriers blocking your success

April 28, 2016 No Comments

This guide will show you how you can positively in uence innovation in your team, department or organization through something you do everyday: learning.

Top Tech Trends in 2016

April 28, 2016 No Comments

To get a sense for what you can expect in 2016, we talked to our course authors, internal experts and customers. We gained some valuable insights into what your team will need to know for the dev, IT and creative industries.

A New Method for Today’s Network Infrastructure

April 26, 2016 No Comments

Network infrastructure today is under increasing pressure from the shifting bandwidth and latency requirements of modern applications. Wide area networks (“WANs”) in particular must address this demand, especially when they use many technologies from a variety of providers, are distributed geographically and suffer strain from the ever-expanding popularity of video and cloud application services. That’s why hybrid WAN architectures with advanced application-level traffic routing are an attractive option; they marry the cost savings of broadband/Internet connectivity for non-critical traffic with the reliability of private lines for critical business applications.

IT Briefcase Exclusive Interview: The rise of cloud application control technology

April 26, 2016 No Comments

with Ed Macnair, CEO, CensorNetIn this interview, Ed Macnair, CEO of CensorNet, speaks with IT Briefcase on how security technologies needs to evolve to meet the challenge and opportunities of cloud computing.Read More >>>

Rugged DevOps: Making Invisible Things Visible

April 26, 2016 No Comments

You might already know them from theagileadmin.com, but let me introduce you to two of the leading minds in the Rugged DevOps movement: James Wickett and Ernest Mueller. Both James and Ernest are active leaders in the DevOps space, in addition to helping organize events like DevOpsDays Austin and LASCON. Our conversation covered a lot of bases from the founding of Rugged DevOps to aligning organizational silos to lessons learned from W. Edwards Demings.

Customer Best Practices for SAP HANA on IBM Power and SUSE Linux

April 25, 2016 No Comments

In this session, you will learn about how a real cutting edge client has deployed the SAP HANA infrastructure using SUSE Linux and the Power Platform to deliver a value service to their client.

ADVERTISEMENT

Women in Technology Summit San Jose

TDWI Orlando 2015

Gartner Identity & Access Management Summit

Gartner Data Center Las Vegas

ITBriefcase Comparison Report

Cyber Security Exchange