Inside the Briefcase


Federating Identities for a Successful Enterprise IdP Deployment

Federating Identities for a Successful Enterprise IdP Deployment

by Lisa Grady, Radiant Logic
When customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security...

The New Rhythm of IT: 5 Hurdles to Overcome in 2014

The New Rhythm of IT: 5 Hurdles to Overcome in 2014

by Ken Berryman, BMC Software, Inc.
The Federal Reserve estimates that in 2012 one in six checks were deposited as a digital image rather than in physical form. For consumers, almost 50 percent of these image-based deposits were through...

The Ins and Outs of Secure Fax and Document Delivery Solutions for the Enterprise

The Ins and Outs of Secure Fax and Document Delivery Solutions for the Enterprise

by Bill Ho, Biscom
Data center annual budgets today are often devoted to securing an organization’s IT networks. One of the most important security considerations IT personnel face is the need to protect sensitive information, such as data exchanged...

Protecting Your Data at Each Step of the Networking Path

Protecting Your Data at Each Step of the Networking Path

by Bill Manning, APC by Schneider Electric
As the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime.
Read More >>>

Efficient Data Automation for Financial Firms

Efficient Data Automation for Financial Firms

By Jim Manias, Advanced Systems Concepts
For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of...

To Cloud or Not to Cloud, That is the Question

To Cloud or Not to Cloud, That is the Question

By Joe Caserta, Caserta Concepts
One of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to...





Briefcase Highlights


Fresh Ink

The Siloed Database Administrator: Breaking down the wall between DBAs and the rest of IT

December 17, 2014 No Comments

with Gerardo Dada, SolarWindsIt’s a rare IT department that doesn’t experience a little bit of the “blame game” when something goes awry—particularly in the first moments after an application goes down or Help Desk tickets start flooding in.Read More >>>

Data Management in the Cloud: Five Fundamentals of Cloud Services Design

December 9, 2014 No Comments

by Robert Kaloustian, CommVaultWith adoption rates soaring, it’s safe to say that the “cloud” is here to stay. While companies of all shapes and sizes rush to jump on the cloud bandwagon, data management miscues could make their journey a long and bumpy ride. Read More >>>

What’s in Store for 2015 – Technology Edition

December 4, 2014 No Comments

by Dan Pickett, nfrastructureWe predict that through next year, technology will only continue to become “consumerized” as devices become more connected, everything becomes software-defined and the Internet of Things becomes completely engrained in our everyday life. Read More >>>

What Globalization Means in the Age of Real-Time, Mobile and Cloud

December 3, 2014 No Comments

by Rob Vandenberg, LingotekRemember when people first started talking about globalization in the 1980s? Branching out into new markets usually meant physically expanding to somewhere in Europe or the U.K. It required opening new offices, growing new markets through direct sales and having dedicated translators interpret content by hand. Read More >>>

IT Briefcase Exclusive Interview with SIOS Technology: SANS-based vs. Cloud Clusters

December 3, 2014 No Comments

with Jerry Melnick, SIOS TechnologyIn this interview, Jerry Melnick, COO, SIOS Technology discusses the difference between SAN-based and Cloud data storage clusters, and the benefits and drawbacks of each approach. Read More >>>

Hiring the Right People for Your IT Service Desk

December 3, 2014 No Comments

By Arvind Parthiban, ManageEngineHiring people for a service desk is a major challenge but an important one. Without good people, even the best processes and tools will fail to deliver high quality services and support. So where do you start? Planning a recruitment process is critical to helping you find the right person quickly. Read More >>>

Security Best Practices for E-Signatures

November 17, 2014 No Comments

By Michael Laurie, Silanis TechnologyElectronic signatures are a critical technology for new business process improvements in industries such as banking, insurance, real estate and healthcare. With security understandably being a top concern for those looking to implement a cloud-based e-signature solution, it is not enough to simply look for one that is ESIGN compliant. Read More >>>

Why Shellshock is Absolutely Terrifying for BYOD Security

November 12, 2014 No Comments

By Israel Lifshitz, NuboLate last month, it was discovered that the security vulnerability Shellshock can be made wormable and grant hackers the ability to run arbitrary codes on Bash, the most widely-used command processor which serves as the default shell for Unix, Linux and Mac OS X. Read More >>>

How to Navigate Data into the Cloud

October 31, 2014 No Comments

By Dave Wagner, TeamQuestThe increase in businesses moving their data into the cloud has created several new challenges for data center managers. Many departments and employees are increasingly using the public cloud to host unpredictable applications with unknown resource requirements. Read More >>>

It’s Time to Go All-in on the Cloud

October 22, 2014 1 Comment

By Joe Manuele, AvayaToday, enterprises and their IT departments are migrating to cloud services faster than ever before. In fact, no other technology in our industry is associated with such dramatic triple-digit growth as cloud. By 2020, the cloud computing industry will be a $40 billion market. Read More >>>

Fishing for Data in a Digitalized Tourism Industry

October 22, 2014 No Comments

By Yves de Montcheuil, TalendAmong the most digitalized industries, travel and hospitality is changing fast. Travel agents, airlines, airports, hotel chains – the entire industry is fishing for value in a seemingly-unlimited ocean of data. Read More >>>

The Internet of Things Won’t Take Off Until These 3 Things Happen

October 15, 2014 No Comments

by Rob Vandenberg, Lingotekf your smartphone can’t read your mind yet, it will soon. Innovators and early adopters are sprinting towards the dream of a connected world, connecting everything from cars to toasters. Their exuberance is contagious. Read More >>>

Federating Identities for a Successful Enterprise IdP Deployment

October 15, 2014 No Comments

by Lisa Grady, Radiant LogicWhen customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security but also productivity and simplicity for your users. Read More >>>

The New Rhythm of IT: 5 Hurdles to Overcome in 2014

October 8, 2014 No Comments

by Ken Berryman, BMC Software, Inc.The Federal Reserve estimates that in 2012 one in six checks were deposited as a digital image rather than in physical form. For consumers, almost 50 percent of these image-based deposits were through mobile devices. Read More >>>

The Ins and Outs of Secure Fax and Document Delivery Solutions for the Enterprise

October 8, 2014 No Comments

by Bill Ho, BiscomData center annual budgets today are often devoted to securing an organization’s IT networks. One of the most important security considerations IT personnel face is the need to protect sensitive information, such as data exchanged within the healthcare, financial, and legal sectors. Read More >>>

Data Back-up vs. Replication vs. Disaster Recovery

October 1, 2014 No Comments

by Ken Donoghue, Peak 10We often hear the three concepts expressed in the title above used interchangeably. For example, it’s not uncommon for someone to say, “I have a disaster recovery (DR) plan. We back up our files once a day.” Or, “We replicate our data to tape and store it offsite.” Read More >>>

Guiding Customer Relationships with an Integrated IT Approach

September 29, 2014 No Comments

by Dennis van der Veeke, SDLThere is no denying that brands have taken an increased interest in technology for marketing efforts. In fact, Gartner reported earlier in the year that 81 percent of organizations now have the equivalent of a chief marketing technologist position. Read More >>>

Protecting Your Data at Each Step of the Networking Path

September 18, 2014 No Comments

by Bill Manning, APC by Schneider ElectricAs the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime. Read More >>>

The Four Phases of Cloud Optimization

September 12, 2014 No Comments

with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>

How far is too far when it comes to outsourcing IT?

September 8, 2014 No Comments

with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>

8 Things You Need to Do Before, During, and After Migrating to Office 365

September 4, 2014 No Comments

with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>

Does your Company Really Need BPM?

September 3, 2014 1 Comment

with Mac McConnell, BonitaSoftDoes everybody need BPM? Are there companies out there that would have no use for the kinds of solutions we provide? Hate to say it, but there might be a few. In the spirit of a Letterman “Late Show Top 10” list, here are 8 types of companies that simply don’t need BPM.Read More >>>

You Can’t Win the Data Loss Blame Game – So End It

September 3, 2014 No Comments

By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>

Efficient Data Automation for Financial Firms

August 26, 2014 No Comments

By Jim Manias, Advanced Systems Concepts For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of relevant data translates into increased revenues and reduced risks for all financial firms. Read More >>>

To Cloud or Not to Cloud, That is the Question

August 11, 2014 No Comments

By Joe Caserta, Caserta ConceptsOne of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to keep data in-house by investing in the appropriate infrastructure? Read More >>>

Context-Aware Security: A Key to Successful BYOD

August 4, 2014 No Comments

by Neal Foster, DELL SoftwareHow can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day. Read More >>>

How to do SIEM on a Shoestring Budget

July 28, 2014 No Comments

by Nicole Pauls, SolarWindsSecurity information and event management (SIEM) software can seem like the perfect solution to smaller IT shops where resources are at a premium and where IT pros are constantly asked to do more with less. However, the reality they encounter is often anything but. Read More >>>

Assessing the Cloud to Find its Silver Lining

July 24, 2014 No Comments

by Russ Loignon, TangoeBusiness moves at the speed of light, and the ability to stay competitive in today’s global workplace dictates that enterprises rely on the technology available today, yet be prepared to adapt quickly for future technologies. Read More >>>

Globalizing the Continuous Delivery Pipeline

July 23, 2014 No Comments

by Rob Vandenberg, LingotekThanks to trends like BYOD and cloud computing, devops now works together as a unified organization, rather than throwing code over an invisible wall. It’s a necessary and timely evolution—especially for today’s sophisticated global IT environments. Read More >>>

Stream vs. Batch Processing – Which One is the Better Business Operations GPS?

July 10, 2014 No Comments

by Dale Skeen, VitriaMany organizations across industries leverage “real-time” analytics to monitor and improve operational performance. Essentially this means that they are capturing and collecting data in lots from various systems and analyzing it in batches through periodic on-demand queries. Read More >>>

ADVERTISEMENT

TDWI

Gartner Identity & Access

Gartner Data Center

Red Hat JBoss Busines Automate

ACI Customer Experience Management Summit

ManageEngine

ITBriefcase Comparison Report

IBM Data