Inside the Briefcase


Federating Identities for a Successful Enterprise IdP Deployment

Federating Identities for a Successful Enterprise IdP Deployment

by Lisa Grady, Radiant Logic
When customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security...

The New Rhythm of IT: 5 Hurdles to Overcome in 2014

The New Rhythm of IT: 5 Hurdles to Overcome in 2014

by Ken Berryman, BMC Software, Inc.
The Federal Reserve estimates that in 2012 one in six checks were deposited as a digital image rather than in physical form. For consumers, almost 50 percent of these image-based deposits were through...

The Ins and Outs of Secure Fax and Document Delivery Solutions for the Enterprise

The Ins and Outs of Secure Fax and Document Delivery Solutions for the Enterprise

by Bill Ho, Biscom
Data center annual budgets today are often devoted to securing an organization’s IT networks. One of the most important security considerations IT personnel face is the need to protect sensitive information, such as data exchanged...

Protecting Your Data at Each Step of the Networking Path

Protecting Your Data at Each Step of the Networking Path

by Bill Manning, APC by Schneider Electric
As the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime.
Read More >>>

Efficient Data Automation for Financial Firms

Efficient Data Automation for Financial Firms

By Jim Manias, Advanced Systems Concepts
For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of...





Briefcase Highlights


SECURITY

Your Money or Your Files! A Short History of Ransomware

October 20, 2014 No Comments

Ransomware attacks cause downtime, data loss, possible intellectual property theft, and in certain industries a ransomware attack is considered a data breach. Multiple ransomware strains are now attacking your end-users. Since September 2013, CryptoLocker has become vicious, and the first strain of second-gen ransomware CryptoWall V2.0 has reared its ugly head. But how did it get this far?

KnowBe4 Issues Alert: CryptoWall 2.0 Ransomware Moves to TOR Network

October 15, 2014 No Comments

Tampa Bay, FL (October 15, 2014) KnowBe4 issued an alert to IT Managers that a new version of the world’s most widespread ransomware CryptoWall has migrated to the TOR network. It has been upgraded to version 2.0, and continues to encrypt files so that a ransom can be extracted if there are no backups or if the backup process fails, often a common occurrence.

The Internet of Things Won’t Take Off Until These 3 Things Happen

October 15, 2014 No Comments

by Rob Vandenberg, Lingotekf your smartphone can’t read your mind yet, it will soon. Innovators and early adopters are sprinting towards the dream of a connected world, connecting everything from cars to toasters. Their exuberance is contagious. Read More >>>

Federating Identities for a Successful Enterprise IdP Deployment

October 15, 2014 No Comments

by Lisa Grady, Radiant LogicWhen customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security but also productivity and simplicity for your users. Read More >>>

Tales of the Unexpected: How Hackers Trick Web Sites into Sharing Your Data

October 9, 2014 No Comments

Recent months have seen a run of high-profile security breaches: social media sites losing phone numbers, retail stores skimming credit cards, healthcare organizations leaking patient records, and even celebrity voicemails and photo streams being hacked.

The New Rhythm of IT: 5 Hurdles to Overcome in 2014

October 8, 2014 No Comments

by Ken Berryman, BMC Software, Inc.The Federal Reserve estimates that in 2012 one in six checks were deposited as a digital image rather than in physical form. For consumers, almost 50 percent of these image-based deposits were through mobile devices. Read More >>>

The Ins and Outs of Secure Fax and Document Delivery Solutions for the Enterprise

October 8, 2014 No Comments

by Bill Ho, BiscomData center annual budgets today are often devoted to securing an organization’s IT networks. One of the most important security considerations IT personnel face is the need to protect sensitive information, such as data exchanged within the healthcare, financial, and legal sectors. Read More >>>

Gartner MQ: Endpoint Protection

October 7, 2014 No Comments

Symantec Endpoint Protection 12.1 was, once again, positioned as a Leader in Gartner’s Magic Quadrant and rated highest in the ability to execute. Read the report to learn about the Endpoint Protection landscape, growth drivers and challenges, and where vendors are positioned.

The Cyber Resilience Blueprint: A New Perspective on Security

October 7, 2014 No Comments

In this sophisticated threat environment, traditional security tactics are failing. Symantec encourages organizations to revisit their security posture to build a more cyber resilient enterprise. Resilience is not defined by a series of checklists, but through evaluations based on the current threat environment and the acceptable risk level for the organization. This whitepaper presents best practice-based approaches recommended for minimizing cyber risk. These are arranged across five pillars and provide specific actions for each pillar to be performed by identifiable IT jobs.

Symantec Intelligence Report: August 2014

October 7, 2014 No Comments

This August intelligence report from Symantec provides the latest analysis of cyber security threats, trends, and insights from the Symantec intelligence team concerning malware, spam, and other potentially harmful business risks.

Overcoming Encryption Sprawl by Asking the Right Questions

October 6, 2014 No Comments

In the U.S., encryption was first used by the federal government to secure the data of U.S. agencies and companies from foreign spies. As the Internet connected and therefore endangered many corporations’ and consumers’ computers, encryption really took off and now enjoys widespread use. In an ironic twist, one of the main driver’s of encryption’s recent uptick in interest and use is worry over government surveillance.

A Vision for Converged Backup Infrastructure

October 2, 2014 No Comments

IT is evolving at an accelerated pace today, thanks in large part to virtualization, cloud computing and big data. While these trends can lower costs and increase efficiency, they are too often delivered via point products that offer only marginal improvements to the traditional approach.

Data Back-up vs. Replication vs. Disaster Recovery

October 1, 2014 No Comments

by Ken Donoghue, Peak 10We often hear the three concepts expressed in the title above used interchangeably. For example, it’s not uncommon for someone to say, “I have a disaster recovery (DR) plan. We back up our files once a day.” Or, “We replicate our data to tape and store it offsite.” Read More >>>

KnowBe4 Says Breach Fatigue May Put Your Company at Risk for Ransomware

September 30, 2014 No Comments

Tampa Bay, FL. A growing number of high profile breaches may be causing breach fatigue, according to Security company KnowBe4. A study conducted by the Ponemon Institute and reported last week by USA Today, noted a staggering 43% of companies have experienced a data breach in the past year, up by 10% over the year prior.

Small Business Protection Again Cyber Attacks

September 29, 2014 No Comments

Over the last year, data breaches in businesses have been big news: Target, Home Depot, eBay, LinkedIn. What most don’t know is that the Target breach actually occurred when an employee of a small HVAC company opened a malware-laced email, allowing the HVAC company’s system to be hacked. It just so happened that this particular company was contracted with one of the Target stores and had remote access for maintenance purposes.

Internet Safety by Top IT Security Experts

September 25, 2014 No Comments

The recent string of media reports about phishing or email password hacking security breeches,like the iCloud celebrity nude picture leak, have caused a media frenzy. This particular case received worldwide attention because the leak involved celebrities. However the reality is that email hacking happens all the time in personal and professional email accounts.

YES, CRIMINALS ARE TARGETING YOUR DATA: HERE ARE 7 MUST DO DEFENSIVE MEASURES

September 24, 2014 No Comments

The 7 Must Do Defensive Measures to protect your personal data.

Why VMI is the future for our BYOD Generation

September 24, 2014 No Comments

While many approaches are being used to control the impact of the mobile age on IT, VMI technology shows your organization can both embrace and thrive in this new world.

Tech Brief: Finance Data after Snowden and Target: Implications for credit unions

September 24, 2014 No Comments

Is there any reason to think that widespread media coverage of large-scale electronic spying by the National Security Agency (NSA), exposed by former government contractor Edward Snowden, has spooked the public?

Protecting Your Data at Each Step of the Networking Path

September 18, 2014 No Comments

by Bill Manning, APC by Schneider ElectricAs the amount of business critical data grows, the importance of data availability surges – businesses simply cannot afford to lose precious data due to instances of downtime. Read More >>>

FireLayers Enables Secure Cloud Application Usage

September 18, 2014 No Comments

The shift to the cloud has been tectonic; however, the IT infrastructures of the last 20 years have not kept pace to adequately protect enterprise networks, data and transactions. Applications are moving to the cloud, so must the corporate security gateway. Enterprises need a cloud application security gateway.

Will Your Company Be Ready If Disaster Strikes?

September 17, 2014 No Comments

It’s always been important to have a Business Continuity and Disaster Recovery (BCDR) plan in place to make sure your company can continue operating in the event of a hurricane, flood, earthquake, fire or – most commonly – human error. But with data and computing power becoming an increasingly essential part of modern companies’ value propositions and product portfolios, it’s arguably more important today than ever before.

The Four Phases of Cloud Optimization

September 12, 2014 No Comments

with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>

White Paper: NSA revelations shake faith in U.S. tech firms as Harris Poll Shows public conflicted

September 10, 2014 No Comments

The poll found that two-thirds of adult Americans who said they are at least somewhat familiar with the NSA revelations believe such companies have violated the trust of users “by working with the government to secretly monitor communications of private citizens.”

How far is too far when it comes to outsourcing IT?

September 8, 2014 No Comments

with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>

TECH BRIEF: YES, CRIMINALS ARE TARGETING YOUR DATA: HERE ARE 7 MUST DO DEFENSIVE MEASURES

September 5, 2014 No Comments

Download this white paper and learn 7 defensive measures to protect your data.

8 Things You Need to Do Before, During, and After Migrating to Office 365

September 4, 2014 No Comments

with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>

You Can’t Win the Data Loss Blame Game – So End It

September 3, 2014 No Comments

By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>

Efficient Data Automation for Financial Firms

August 26, 2014 No Comments

By Jim Manias, Advanced Systems Concepts For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of relevant data translates into increased revenues and reduced risks for all financial firms. Read More >>>

The New Threat from an Old Friend

August 20, 2014 No Comments

When it comes to security, IT pros can’t control everything. Not all threats can be mitigated by following the simple best practices of keeping security software up-to-date and regularly patching vulnerable applications. In addition, not all potentially risky features can simply be turned off, even if IT pros would like to.

ADVERTISEMENT

Gartner Identity & Access

Gartner Data Center

Red Hat JBoss Busines Automate

ACI Customer Experience Management Summit

ManageEngine

ITBriefcase Comparison Report

IBM Data