Inside the Briefcase

Briefcase Highlights


Top Three Ways Veritas Access enables the Multi-Cloud

June 15, 2018 No Comments

ecent research found that 74% of enterprises currently use two or more different cloud infrastructures. Why? Because multiple clouds can offer better overall performance, eliminate vendor lock-in and improve your ability to address different business needs. The problem is that multiple clouds also add complexity that can make it more difficult to manage and protect your data in and across all these different environments. The brief, “3 ways Veritas Access enables multi-cloud adoption,” explores the data protection challenges created by multi-cloud adoption, what to look for in a solution, and the three ways Veritas Access can help you manage and protect your data in and across multiple clouds.

IT Briefcase Exclusive Interview: The Current State of Authentication

June 13, 2018 No Comments

With the explosive growth of the IoT market and the ubiquity of smartphone apps with access to personal and sensitive user data, it has become crucial to ensure that user authentication is secure, accurate, and immediate. Today we talk with Alexey Khitrov, CEO of ID R&D, about his perspective on the current state of authentication, and what smart businesses can do to protect customers’ security while simultaneously making users’ experience less painful and frictionless.

Facial Recognition Within a Business: Pros and Cons

June 12, 2018 No Comments

Facial recognition technology (FRT) was once seen as a fictional concept. Companies would use it as a tool to eradicate crime. However, today’s technology has revolutionized facial recognition and made it a practice in everyday lives. Applications such as Amazon’s Recognition and Apple’s ID technology have made facial recognition a more realistic than fictional concept. Perhaps you have been wondering what is facial recognition and how does artificial intelligence work.

Could Accepting Cryptocurrencies Help Your Business?

June 11, 2018 No Comments

Cryptocurrencies of all kinds are beginning to take over the world, and with a huge number of benefits such as transparency, its decentralised nature, and its global accessibility, it’s easy to see why a number of businesses are looking to integrate these digital payments. With big brands such as Microsoft already integrating this type of technology, smaller businesses and start-ups are looking to follow their lead. Here, we’re taking a closer look at whether or not accepting cryptocurrencies could actually help your business in the long run.

IT Briefcase Exclusive Interview: The Value and Incresed Use of Facial Recognition Software

June 8, 2018 No Comments

In this interview, we talk to Brian Strock, Manager, Public Safety Group at Numerica Corporation, about facial recognition software, the increased use of this technology by law enforcement, and Numerica’s latest software solution, Lumen FR.

Understanding the Latest Cybersecurity Threats

June 4, 2018 No Comments

Digital threats are constantly evolving and even the most stringent security efforts may prove to be insufficient should they fall behind the times. Just as cyber-attacks have grown more sophisticated, technologies like cloud computing or the growing number of ways that mobile applications are finding their way into everyday life means that the consequences of a data breach or attack have never been more serious.

Software Solutions: Your Fast Track to GDPR Compliance

June 1, 2018 No Comments

The General Data Protection Regulation (GDPR) has arrived and many companies in the EU and U.S. are racing to get their security and privacy processes in place, even after the May 25th deadline. If your organization isn’t 100 percent compliant yet, you’re not alone. A survey conducted by the Ponemon Institute in April revealed that out of the 1,000 EU and U.S. companies in a variety of sectors who were surveyed, only 42 percent expected to be in compliance with GDPR by the deadline.

Infographic: The Importance Of An IT Asset Disposition Strategy

May 31, 2018 No Comments

Companies are increasingly concerned with IT Asset Disposition (ITAD), according to a recent global survey conducted by IDG Research Services. Several factors are pushing them to create a formal ITAD policy, with IT and business leaders knowing that if their policies fail, the consequences are substantial.

Little-Known Ways Hackers Pilfer Your Personal Information

May 29, 2018 No Comments

You’ve likely heard of some of the more common ways online hackers can steal your information and commit identity theft, but there are more than a few additional vulnerabilities that might shock you. Remain diligent in your efforts to protect your passwords while you’re online, but make sure you stay up-to-date on the newest ways hackers can worm their way into your life, your personal information and your finances.

Data Preparation is the Key to Good Analytics

May 25, 2018 No Comments

The proper preparation of data influences the type of analysis which can be performed with data analytics tools. The less prepared data is, the more difficult it will be for data analytics to be performed and for end-users to answer questions in a simple manner. Also, effective data preparation and modelling has a major influence on the overall performance of a business, so proper data preparation is key for business operations, not just good analytics.

Why Should Disaster Recovery Services be the backbone of any resilient business?

May 24, 2018 No Comments

Back when technology was less advanced, companies that wanted to protect their working environment and infrastructure from disastrous outages had to either double up on existing hardware, squeezing it into their cramped premises or rely on slow, unreliable backup media. Nowadays, thanks to Cloud Computing technology businesses can rely on professional and effective Disaster Recovery as a Service, that not only offers a more reliable recovery plan but a true resilience. Read below, if you want to retain your business operating, no matter what.

GDPR: What Is It and How Will It Affect Your Online Business?

May 17, 2018 No Comments

If you use any type of online service, chances are you received several emails about updates to the privacy policy of those services. Some of those emails may even mention GDPR, a new regulation by the European Union regarding data protection. This is a change that affects all websites that collect user data in any way. What is GDPR exactly? How will it affect your digital life? More importantly, does the new regulation affects your online business? We are going to answer these questions in this article.

How Can You Make Your Online Store More Secure?

May 17, 2018 No Comments

Adding an online store to any home business is an exciting milestone. With your own online store, the chances of making some serious cash increase precipitously. However, if you don’t take security seriously, it will come back to haunt you.

Why Data Security Compliance is Essential for Online Retailers

May 17, 2018 No Comments

With the GDPR coming into effect across the EU, it is now the perfect time for businesses to revise their cybersecurity arrangements to ensure compliance. Compliance with regulations is essential in order to both avoid legal issues and to protect a business’ assets and reputation.

IT Briefcase Exclusive Interview: Why Protecting Net Neutrality Means Protecting Innovation and Choice

May 16, 2018 No Comments

with Russell P. Reeder, OVH USIn this informative interview, Russell P. Reeder, CEO and president of OVH US, shares his thoughts on net neutrality and what the recent legislation changes mean for consumers and businesses. Read More >>>

IT Briefcase Exclusive Interview: Selecting the Best BPM Tools for Your Business

May 8, 2018 No Comments

In this interview, we talk to Thomas Kohlenbach, Principal Consultant with Promapp Solutions, about the role business process management can play in supporting process improvement, and how to go about selecting the appropriate BPM tool for your business.

Top ERP Systems – Definitive Pricing Guide 2018

May 7, 2018 No Comments

Get an in-depth comparison of the costs and implementation models for the top ERP systems. This practical guide helps buyers compare the cost factors and product limitations of the most popular ERP systems. The SelectHub platform contains expert software analysis across key criteria and vendor data. These built-in analyst ratings are combined with subjective user ratings to create SelectHub ratings reports—which allow us to provide you with highly accurate recommendations and pricing.

Top BI Analytics Tools for 2018 – Expert Reviews and Pricing

May 4, 2018 No Comments

Zero in on the best BI solutions for your company. Interactive analyst report gives you comparison ratings, reviews and pricing from actual software selection projects. Unlike some ratings, SelectHub product scores are taken from multiple sources including top analysts and actual software buyers—ideal for your shortlist.

The Top Benefits of Remote Desktop Services

May 2, 2018 No Comments

You can boost your office productivity simply by investing in the right technology. Remote desktop services, in particular, can be the key to corporate success, no matter what industry you are a part of. In this post, we’ll look closely at the top benefits of using remote desktop services! Read on for insight.

Can SMBs Benefit from Outsourcing Security?

May 1, 2018 No Comments

Almost half of UK enterprises have been the victim of a cyber security breach, hack or attack during the last 12 months, according to the 2018 Cyber Security Breaches Survey, as the spectre of malware, viruses, fraud and scammers becomes more challenging for CIOs to combat effectively. The good news is that a robust strategy can mitigate the growing number of security threats that companies face each and every day. “Cyberattacks can inflict serious commercial damage and reputational harm, but most campaigns are not highly sophisticated,” National Cyber Security Centre Chief Executive Ciaran Martin says.

Why Data Security in Cloud Computing is a Good Investment

April 30, 2018 No Comments

These days, more and more business owners are starting to inquire about data security in cloud computing. To some of you, this may come as a surprise. After all, isn’t the cloud supposed to be safer than your traditional in-house IT infrastructure? To be fair, this is true — but only to an extent.

6 Tips To Keep Yourself & Co-Workers Safe From Phishing Attacks

April 27, 2018 No Comments

There is a growing concern among businesses about phishing attacks. What’s phishing, you might ask? Phishing is a form of spam where hackers try to steal your personal information by tricking you. An example of phishing might be when you receive an email claiming it’s from your Amazon and asking for you to log into your account. If you’re not careful and don’t look for any warning signs on the email, you could voluntarily give your private baking information away on accident. Yikes.

My Journey with Bitdefender Total Security – A Review

April 24, 2018 No Comments

In my review, I am going to look deeply into Bitdefender Total Security which is a replacement anti-virus product for me because I was using some other before. After using it, I am now sure that Bitdefender Total Security product is pretty sound for all of you to have in their systems and devices, as it is for me. I started using Bitdefender Total Security because I wanted to try something different from what I was already using. After some research on Bitdefender Total Security, it seemed to me like a better option than other available on the internet. Also, it is cheaper than many other security systems. Therefore, I finalized my order for Bitdefender Total Security on their official website.

Network Access Controls in the Age of Enterprise Mobility

April 23, 2018 No Comments

Enterprise mobility is an approach to work in which companies allow their team members to work from anywhere using a variety of devices and applications. The term “Enterprise Mobility” typically covers both the mobility of corporate data as well as the mobility of team members. This includes the use of mobile devices, such as smartphones, tablets and laptops for business purposes, from anywhere – in the office, at home and in transit to remote cities or countries, while maintaining access to corporate data, communications and programs.

Helpful Cyber Security Tips for 2018

April 18, 2018 No Comments

There are many threats prevalent in today’s world. Cybercrime is one of the threats which acts as a ‘sweet poison’. It slowly enters into our world, pickpockets the relevant information and flies away like time. The only super-hero who can fight against this villain is Cyber Security. The government, military, corporate, medical and financial organizations collect process and store huge amount of data on computers and other devices.

Enhance and Upgrade Enterprise Security with Efficient Management of Digital Certificates

April 13, 2018 No Comments

Enterprises are aiming to automate all verticals of their businesses in 2018, whether that be their network infrastructures, processes, workflows or products. However, most enterprises focus the majority of their time on streamlining these larger business processes, and tend to lose sight of smaller yet critical components of their digital businesses. One area that is often overlooked and mistakenly taken for granted is the digital certificate.

IT Briefcase Exclusive Interview: Fighting Crime with Forensic Software

April 10, 2018 No Comments

In this interview, we talk to Dr. John Buckleton about the increasing use of forensic DNA software in solving criminal cases. Dr. Buckleton is one of the developers of STRmix™, a sophisticated forensic software used to resolve mixed DNA profiles previously considered too complex to interpret.

How Machine Learning Is Helping Prevent Fraud Through Faster Detection

April 10, 2018 No Comments

The Federal Trade Commission fielded 1.1 million complaints of fraud in 2017, according to the latest FTC Consumer Sentinel Network Data Book. Consumers lost $905 million to fraud last year, an increase of $63 million from 2016. Over one in five people who reported a complaint experienced a financial loss, with a median loss of $429. To fight this wave of fraud, one tool merchants and financial providers are turning to is machine learning, empowered by artificial intelligence (AI). Here’s how AI-powered machine learning is helping companies improve their efforts to fight fraud.

Three of the Latest and Greatest Ideas in Technology

April 9, 2018 No Comments

When it comes to the fastest growing ideas in technology and business, they are being driven by the digital innovation the world is seeing. These changes affect every industry. And if you want to compete in the coming years, you need to understand what these growing ideas are and why they have taken hold. That way, you can stand out from the competition and grow your market share.

How New Touch Screen Technology Is Stimulating Innovation

April 7, 2018 No Comments

Ever since touch screen technology emerged in in the 1970s, it has been linked to a wide array of breakthroughs in industries as diverse as logistics, computing, entertainment, and the military. As touch screens have become more sophisticated, they have opened up new possibilities for developers to create products that would not have been imaginable without high quality, responsive touchscreens. Just as the smartphone revolution was made possible by the projected capacitive (PCAP) touch screen, new developments in resistive screen technology are now fuelling new applications for kiosks, industrial control panels, and mobile computing devices.


Gartner IT Operations

SuperCharge Your Cloud

American CISO

IBC 2018

ITBriefcase Comparison Report

We have updated our Privacy Policy. Click here to preview.