Inside the Briefcase


IT Briefcase Interview: Machine Learning – the Key for Securing Big Data?

IT Briefcase Interview: Machine Learning – the Key for Securing Big Data?

with Dale Kim, MapR Technologies
In this interview, Dale Kim, senior director of industry solutions at MapR, speaks with IT Briefcase on the critical role machine learning plays in cyber-security today.
Read More >>>

IT Briefcase Exclusive Interview: IBM Cloud Video Powers NASA Live Streaming

IT Briefcase Exclusive Interview: IBM Cloud Video Powers NASA Live Streaming

with Alden Fertig, IBM Cloud Video’s Ustream
In this interview, Alden Fertig, Vice President of Product for IBM Cloud Video’s Ustream, and brings us along the evolution of NASA’s live streaming.
Read More >>>

IT Briefcase Exclusive Interview: Cloud Sandboxes and Their Many Benefits

IT Briefcase Exclusive Interview: Cloud Sandboxes and Their Many Benefits

with Shashi Kiran, Quali
IT Briefcase conducted the following Q&A with Quali Chief Marketing Officer Shashi Kiran to get a better understanding about the beneficial uses of cloud sandboxes as the DevOps trend continues to take hold and gain...

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

with Mike Martin, nfrastructure
In this interview, Mike Martin, CTO, nfrastructure, speaks with IT Briefcase about what he believes will be the top IoT trends and predictions for organizations of all sizes and their IT teams for the coming...

Turning Trust Upside Down: How to Reduce Security Risks in a Cloud-based Economy

Turning Trust Upside Down: How to Reduce Security Risks in a Cloud-based Economy

by Rob Quiros, Soha
As the move to hybrid cloud infrastructure causes the Internet and corporate network to meld, enterprises need a new approach to ensure all of their applications and network resources remain secure. But that is easier...





Briefcase Highlights


Fresh Ink

IT Briefcase Interview: Machine Learning – the Key for Securing Big Data?

November 29, 2016 No Comments

with Dale Kim, MapR TechnologiesIn this interview, Dale Kim, senior director of industry solutions at MapR, speaks with IT Briefcase on the critical role machine learning plays in cyber-security today. Read More >>>

IT Briefcase Exclusive Interview: IBM Cloud Video Powers NASA Live Streaming

November 22, 2016 No Comments

with Alden Fertig, IBM Cloud Video’s UstreamIn this interview, Alden Fertig, Vice President of Product for IBM Cloud Video’s Ustream, and brings us along the evolution of NASA’s live streaming. Read More >>>

IT Briefcase Interview: A Conversation on A.I. in IT Service Management

November 9, 2016 No Comments

with John Prestridge, SunView SoftwareIn this interview, SunView sits down with a good friend and customer who manages an IT team for an Illinois county government workforce. Due to her role within the Illinois government, we have respected her request to remain anonymous. Read More >>>

IT Briefcase Exclusive Interview: The Future of Huddle and The Cloud Collaboration Market

October 20, 2016 No Comments

with Morton Brogger, HuddleIn the following interview, Morten Brøgger, the CEO of Huddle discusses secure enterprise cloud collaboration and the future of the market. Read More >>>

IT Briefcase Exclusive Interview: Cloud Sandboxes and Their Many Benefits

October 17, 2016 No Comments

with Shashi Kiran, QualiIT Briefcase conducted the following Q&A with Quali Chief Marketing Officer Shashi Kiran to get a better understanding about the beneficial uses of cloud sandboxes as the DevOps trend continues to take hold and gain industry momentum. Read More >>>

IT Briefcase Exclusive Interview: Understanding How Big Data Is Transforming Healthcare

September 8, 2016 No Comments

with Sanjeev Agrawal, LeanTaas HealthcareIn this interview, Sanjeev Argawal, explains how data-science can optimize the scheduling of patient appointments based on a holistic view of healthcare operations. Read More >>>

IT Briefcase Exclusive Interview: Why Software Flaws are Costing Companies Billions

September 7, 2016 No Comments

with Vincent Delaroche, CAST In this interview with IT Briefcase, Delaroche discusses why the structural quality of software matters and why he’s still extremely passionate about the business he started 25 years ago. Read More >>>

IT Briefcase Exclusive Interview: Top 5 Must-have Security Features Every USB Drive Should Have

August 16, 2016 No Comments

with Mike McCandless, Apricorn In this interview, Apricorn VP Mike McCandless provides insight into the top must-have security features that every USB drive should contain. Read More >>>

IT Briefcase Exclusive Interview: The Rise of Machine Learning Analytics

July 28, 2016 No Comments

with Jerry Melnick, SIOSIn this interview, SIOS Technology President and CEO Jerry Melnick speaks with IT Briefcase about optimizing infrastructure operations and application performance in complex VMware environments. Read More >>>

IT Briefcase Exclusive Interview: Decoding Encryption with Sophos’ Dan Schiappa

July 21, 2016 No Comments

with Dan Schiappa, SophosIn this interview, Dan Schiappa, senior vice president and general manager of Enduser Security Group at Sophos, outlines some of the current IT security topics being addressed by businesses today. Read More >>>

IT Briefcase Exclusive Interview: Rethink and Replace VPNs with Workspace-as-a-Service Solutions

June 6, 2016 No Comments

with Jon Senger, VertiscaleIn this interview, Jon Senger, co-founder and CTO of Vertiscale, speaks with IT Briefcase about the weaknesses of VPN-based remote access solutions and describes how new cloud-based Workspace-as-a-Service platforms support much higher levels of data security along with vastly greater convenience for end-users. Read More >>>

IT Briefcase Exclusive Interview: Data Migration with Globanet

June 1, 2016 No Comments

with Globanet In this interview, Globanet discusses how data migration industry has matured with Enterprise Class offerings, and in what ways clients are now trying to find the right technology to meet their requirements now and for years to come. Read More >>>

IT Briefcase Exclusive Interview: Understanding the Evolution of Enterprise Mobility

May 16, 2016 No Comments

with Wes Gyure, IBM SoftwareIn this interview, Wes Gyure, MaaS360 Portfolio Offering Manager, IBM, helps us understand the evolution of enterprise mobility and the challenges organizations are facing as they look to enable their mobile workforce. Read More >>>

IT Briefcase Exclusive Interview: Steps for Successful VDI Implementation

May 6, 2016 No Comments

with Jeremy Moskowitz, Founder and CEO, PolicyPak SoftwareIn this interview, Jeremy Moskowitz, founder and CEO of PolicyPak, speaks with IT Briefcase on the challenges and opportunities of using a virtual desktop infrastructure (VDI.)Read More >>>

Scale-Out NAS: Best Practices to Implement Tomorrow’s Storage Today

April 29, 2016 No Comments

by Stefan Bernbo, CompuverdeAs the data deluge continues on unabated, vertically scaling legacy approaches to storage are falling short. Organizations need to find a way to store high volumes of data without busting the budget, all while maintaining high levels of performance… Read More >>>

IT Briefcase Exclusive Interview: The rise of cloud application control technology

April 26, 2016 No Comments

with Ed Macnair, CEO, CensorNetIn this interview, Ed Macnair, CEO of CensorNet, speaks with IT Briefcase on how security technologies needs to evolve to meet the challenge and opportunities of cloud computing.Read More >>>

IT Briefcase Exclusive Interview: Top Skills Needed to Manage Hybrid IT Environments

March 14, 2016 No Comments

with Kong Yang, SolarWindsIn this interview, Kong Yang, Head Geek and technical product manager at SolarWinds, speaks with IT Briefcase on how hybrid environments are changing the role of the IT professional. Read More >>>

Are You Prepared for the Top Three Compliance Issues?

February 26, 2016 No Comments

by Fouad Khalil, SSH Communications SecurityNo matter what an enterprise’s major market is, it is probably subject to regulatory compliance requirements, such as PCI, SOX, FISMA and HIPAA. PCI requirements in particular demand a high level of auditability and controls. Read More >>>

IT Briefcase Exclusive Interview: Hottest Trends for Government IT Leaders in 2016

February 4, 2016 No Comments

with Chadd Kenney, Pure StorageIn this interview, Chad Kenney discusses how critical laying strategic foundational IT infrastructure is for success in the short-term and over the long haul. Read More >>>

The Access and Identity Market Is Growing: Here’s Why

January 28, 2016 No Comments

by Dean Wiech, Tools4everWhile as a whole, the IAM market has been growing, there have been certain areas and solutions that have, in particular, shown great growth. What are these and why have organizations of all sizes been implementing them? Read More >>>

IT Briefcase Exclusive Interview: The Customer Experience Gap – A Q&A with IBM’s Hannah Egan

January 10, 2016 No Comments

with Hannah Egan, IBM CommerceIn this interview, we posed several questions to Hannah Egan, Product Strategy Specialist, IBM Commerce and she helped us understand the changing customer experience landscape and offered some useful tips. Read More >>>

Five Things to Look Forward to in 2016

January 7, 2016 No Comments

by Alex Atzberger , AribaIt’s time for annual predictions. Rather than trying to consult a crystal ball, I will instead offer up five things I see today that I believe will shape our tomorrow.Read More >>>

IT Briefcase Exclusive Interview: BYOD Holiday Hazards for Popular Shopping Apps

December 17, 2015 No Comments

with Maureen Polte, Flexera SoftwareIn this interview, Maureen Polte from Flexera Software discusses why it’s important for enterprises to understand the risky behaviors associated with mobile apps that could compromise data security in today’s BYOD environment. Read More >>>

IT Briefcase Exclusive Interview: Top IoT Trends and Predictions for Organizations in 2016

December 2, 2015 No Comments

with Mike Martin, nfrastructureIn this interview, Mike Martin, CTO, nfrastructure, speaks with IT Briefcase about what he believes will be the top IoT trends and predictions for organizations of all sizes and their IT teams for the coming year. Read More >>>

IT Briefcase Exclusive Interview with Learning@Cisco: New Training Needed to Manage the Internet of Everything

December 2, 2015 No Comments

with Tejas Vashi, Learning@CiscoThe Internet of Everything (IoE) is bringing together people, process, data and things to make networked connections more relevant and valuable than ever before. Understandably, this is accelerating the pace of digital transformation. Read More >>>

Shifting to a Design-Driven Culture

November 19, 2015 No Comments

by Antoine Mottier, BonitasoftUnderstanding customer need is more important today than ever as millennials enter the workforce. According to Goldman Sachs, millennials are one of the largest generations in history and are about to move into their prime spending years – poised to reshape the economy. Read More >>>

IT Briefcase Exclusive Interview: Navigating Threat Mitigation

November 11, 2015 No Comments

Nikhil Premanandan, ManageEngineIn this interview, Nikhil Premanandan from ManageEngine discusses the importance of notifying DBAs the moment any anomalous activity is detected and finding the root cause, enabling a faster threat mitigation response. Read More >>>

Five Places to Focus Your Privacy Efforts

October 20, 2015 No Comments

by Agathe Caffier, DMIThese days, there’s just no telling who’s accessing your data. It could be a social network, an ad retargeting campaign, or even a cyber criminal who’s bought your private information on the dark Web. Read More >>>

IT Briefcase Exclusive Interview with Napatech: The Future of Network Appliances

October 19, 2015 No Comments

Daniel Joseph Barry, NapatechIn this interview, Dan Joe Barry speaks with IT Briefcase about the results of a recent Heavy Reading survey of communications service provider (CSP) and network equipment provider (NEP) registrants regarding the current use of both traditional hardware and virtualized network appliances. Read More >>>

Turning Trust Upside Down: How to Reduce Security Risks in a Cloud-based Economy

October 9, 2015 No Comments

by Rob Quiros, SohaAs the move to hybrid cloud infrastructure causes the Internet and corporate network to meld, enterprises need a new approach to ensure all of their applications and network resources remain secure. But that is easier said than done, since traditional network perimeters and VPNs simply don’t work in this new cloud-based environment. Read More >>>

ADVERTISEMENT

AnDevCon


American Customer Festival 2016 New York

ITBriefcase Comparison Report

Cyber Security Exchange