Inside the Briefcase

Federating Identities for a Successful Enterprise IdP Deployment

Federating Identities for a Successful Enterprise IdP Deployment

by Lisa Grady, Radiant Logic
When customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security...

Briefcase Highlights


Tech Predictions: Mobile Trends for 2015

December 30, 2014 No Comments

It’s that time of the year again. If it’s not a wrap-up of the noteworthy milestones or events of the year that’s about to close, we’re bombarded with tech predictions for the upcoming year from various experts and observers. Not that we’re complaining. And just so we showcase our solidarity with industry thought leaders who willingly share their expertise with the world, this article will be compiling some of the more prominent mobile predictions for 2015.

Watch “The Cost of a Bad App- and how to deliver a good one, fast”

December 30, 2014 No Comments

The first part of the webcast briefing will focus on the global survey findings and their business implications – quantifying the cost of a bad app. The second part will cover strategies and solution options for consistently delivering good apps fast. After the webcast, you may view the report done by Forrester.

What’s in Store for 2015 – Technology Edition

December 4, 2014 No Comments

by Dan Pickett, nfrastructureWe predict that through next year, technology will only continue to become “consumerized” as devices become more connected, everything becomes software-defined and the Internet of Things becomes completely engrained in our everyday life. Read More >>>

What Globalization Means in the Age of Real-Time, Mobile and Cloud

December 3, 2014 No Comments

by Rob Vandenberg, LingotekRemember when people first started talking about globalization in the 1980s? Branching out into new markets usually meant physically expanding to somewhere in Europe or the U.K. It required opening new offices, growing new markets through direct sales and having dedicated translators interpret content by hand. Read More >>>

The Tip of the Iceberg – Making Mobile Enterprise Ready

November 18, 2014 No Comments

It is no secret that mobile applications provide rapid, almost instantaneous access to data. They are the gateway to a new era of information sharing – unfortunately, they also have the ability to become the Achilles’ heel for data security. Personal data security is at the forefront of consumer concerns when they consider adopting mobile applications. It is easy to see why, when just within the past few weeks, a major retailer, a global bank, and a federal government agency all reported intruders had compromised the personal and financial information of millions of their customers and constituents.

2015 mobile computing trends

November 13, 2014 No Comments

There are now roughly two billion smartphone users in the world, and several hundred million tablet users. Add to that laptops and you get a considerable chunk of the world’s population that is always connected, on the go, everywhere, with their work and private lives in their pockets and handbags. But mobility has side effects… The cracked display is a common sight these days.

Why Shellshock is Absolutely Terrifying for BYOD Security

November 12, 2014 No Comments

By Israel Lifshitz, NuboLate last month, it was discovered that the security vulnerability Shellshock can be made wormable and grant hackers the ability to run arbitrary codes on Bash, the most widely-used command processor which serves as the default shell for Unix, Linux and Mac OS X. Read More >>>

IBM Predicts Record Mobile Holiday Shopping as Consumers Browse and Buy on the Go

November 6, 2014 No Comments

IBM (NYSE: IBM) today released its predictions for the 2014 holiday shopping season based on billions of online and in-store transactions analyzed by the IBM Digital Analytics Benchmark and IBM Quarterly Retail Forecast.

Mobile First: Securing Information Sprawl

November 6, 2014 No Comments

In a recent survey, “The Mobile Trust Gap,” MobileIron reported that of the 3000 respondents, 80% claimed they are using personal smartphones and tablets for work.

Delivering Next-Gen Customer Experiences: How to Quickly Build the Apps Your Business Needs

October 31, 2014 No Comments

As customer-focused executives, you understand all too well that success today is based on delivering great customer experiences. Increasingly, this means that you need next generation applications to support new processes, products/services and even business models. These applications aid a variety of functions, including serving customers across channels, assisting with sales and marketing operations, supporting customer communities, and enabling e-commerce and other digital services.

BYOD to BYOA: Shaping the Future of Your Work Environment

October 31, 2014 No Comments

The Bring Your Own Device (BYOD) trend has been growing in a number of businesses for the past few years. Now, a different, yet related, trend has emerged—Bring Your Own Application (BYOA). BYOA allows employees to choose and use the software they believe helps them perform their jobs best and bring these programs into the office on their devices.

BYOD: California Court Decides Who’s Wearing the Pants

October 22, 2014 No Comments

The workplace trend of BYOD (Bring Your Own Device) is nothing new. What remains unclear, however, is the burden of ownership, cost and security. When employees bring their own cell phones, laptops or tablets to work, there’s a fair chance they’ve personally purchased those devices—data plans and all. In fact, some employers today require a BYOD policy, with no intention of paying for any of it. As one CIO bluntly put it, “Well, we don’t buy their pants either, but they’re required for the office.”

New Mendix Release Enables No-Code Delivery of Multi-Device Mobile Apps for the Enterprise

October 22, 2014 No Comments

Mendix, the enterprise app platform as a service (aPaaS) company, announced major enhancements to the Mendix App Platform, drastically reducing the time, cost and effort for companies to deliver multi-channel and mobile apps. With this new release, Mendix empowers both business users and developers to easily build cross-platform mobile apps that provide the rich, native experience enterprise users are clamoring for.

Federating Identities for a Successful Enterprise IdP Deployment

October 15, 2014 No Comments

by Lisa Grady, Radiant LogicWhen customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security but also productivity and simplicity for your users. Read More >>>

Sophos Advances Cloud Mobile, and Web Security with Acquisition of Mojave Networks

October 7, 2014 No Comments

Sophos today announced that it has acquired cloud-based security firm Mojave Networks of San Mateo, Calif. This acquisition will strengthen Sophos cloud-managed and appliance-based security solutions. To Sophos Cloud, an integrated cloud-managed security offering, Mojave will add a rich cloud-based web security solution. And to Sophos’ line of network security hardware it will enable hybrid deployment options (SaaS and non-SaaS) to meet diverse web security needs.

Innovation in the enterprise: How can CIOs ensure its success?

September 29, 2014 No Comments

How CIOs can handle the disruption caused by increased innovation in the enterprise. Ten years ago, mobile consisted of email, voice and SMS. Any innovation was very much behind the firewall, in a closed environment. If new developments were needed, resources would have to be allocated and as a result, any CIO would have to be very sure of a return on the investment before innovation projects could go ahead.

Why VMI is the future for our BYOD Generation

September 24, 2014 No Comments

While many approaches are being used to control the impact of the mobile age on IT, VMI technology shows your organization can both embrace and thrive in this new world.

Driving Enterprise Transformation with Box and Office 365

September 23, 2014 No Comments

Download this white paper and read how IT needs a transformation to a more user-centric, mobile-aware and agile model, and the best-of-breed architecture the cloud affords is key to unlocking this next evolution of enterprise technology.

The Four Phases of Cloud Optimization

September 12, 2014 No Comments

with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>

How far is too far when it comes to outsourcing IT?

September 8, 2014 No Comments

with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>

8 Things You Need to Do Before, During, and After Migrating to Office 365

September 4, 2014 No Comments

with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>

You Can’t Win the Data Loss Blame Game – So End It

September 3, 2014 No Comments

By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>

Raising the game – The IBM Business Tech Trends Study

August 26, 2014 No Comments

IBM has evaluated the current adoption landscape of 4 key technologies in the enterprise: Big Data & Analytics, Cloud, Mobile and Social

IT Briefcase Interview: Mobile Website and Custom APIs Monitoring

August 11, 2014 No Comments

In this interview, Zaheeruddin Ahmed B, marketing analyst at Site24x7, a ManageEngine cloud service, discusses the need for a way to monitor mobile apps and mobile-optimized websites — from the perspective of the mobile user — and his company’s efforts to do just that with its industry-first mobile monitoring solution.

Context-Aware Security: A Key to Successful BYOD

August 4, 2014 No Comments

by Neal Foster, DELL SoftwareHow can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day. Read More >>>

Got WiFi? Free App Helps You Meet Basic User Needs

July 28, 2014 No Comments

Did you hear the one about the teacher who asks a group of students to name something they need but can’t see or feel? The hip-hop loving, smart-gadgets sporting, what’s-apping generation answer in unison, “WiFi.” Increasingly, WiFi is becoming indispensable and, apparently, a candidate for inclusion in Maslow’s hierarchy of basic human needs.

Assessing the Cloud to Find its Silver Lining

July 24, 2014 No Comments

by Russ Loignon, TangoeBusiness moves at the speed of light, and the ability to stay competitive in today’s global workplace dictates that enterprises rely on the technology available today, yet be prepared to adapt quickly for future technologies. Read More >>>

Globalizing the Continuous Delivery Pipeline

July 23, 2014 No Comments

by Rob Vandenberg, LingotekThanks to trends like BYOD and cloud computing, devops now works together as a unified organization, rather than throwing code over an invisible wall. It’s a necessary and timely evolution—especially for today’s sophisticated global IT environments. Read More >>>

Mobility Today and Tomorrow: It’s Time to Dial In

July 10, 2014 No Comments

Mobile today is changing how people interact as well as how work gets done. The questions that remain are, what will drive the factors that fuel mobile’s next evolution and for those who still haven’t taken the leap, what should they consider as they decide to go mobile?

BYOD Security Risks: Companies May Be Playing with Fire

June 26, 2014 No Comments

The BOYD policy has already become a substantial factor in the corporate world, with there being enough documented evidence to establish the fact that it gives a significant boost to employee’s productivity. As more and more companies are warming up to the idea of allowing personal mobile devices in the workplace, the security implications of adopting such a policy are becoming increasingly hard to ignore. Indeed, companies are putting a lot at risk for getting a bit more out of their employees.


Gartner BI Summit

UC Expo

Gartner Enterprise Architecture

Cloud Expo

Red Hat JBoss Busines Automate


ITBriefcase Comparison Report