Inside the Briefcase

Briefcase Highlights


The Four Phases of Cloud Optimization

September 12, 2014 No Comments

with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>

White Paper: NSA revelations shake faith in U.S. tech firms as Harris Poll Shows public conflicted

September 10, 2014 No Comments

The poll found that two-thirds of adult Americans who said they are at least somewhat familiar with the NSA revelations believe such companies have violated the trust of users “by working with the government to secretly monitor communications of private citizens.”

How far is too far when it comes to outsourcing IT?

September 8, 2014 No Comments

with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>


September 5, 2014 No Comments

Download this white paper and learn 7 defensive measures to protect your data.

8 Things You Need to Do Before, During, and After Migrating to Office 365

September 4, 2014 No Comments

with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>

You Can’t Win the Data Loss Blame Game – So End It

September 3, 2014 No Comments

By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>

Efficient Data Automation for Financial Firms

August 26, 2014 No Comments

By Jim Manias, Advanced Systems Concepts For modern companies, apps and systems (not pigeons) are carrying the data, and it falls on IT to be sure this movement happens quickly and accurately.Timeliness and efficiency in the delivery of relevant data translates into increased revenues and reduced risks for all financial firms. Read More >>>

The New Threat from an Old Friend

August 20, 2014 No Comments

When it comes to security, IT pros can’t control everything. Not all threats can be mitigated by following the simple best practices of keeping security software up-to-date and regularly patching vulnerable applications. In addition, not all potentially risky features can simply be turned off, even if IT pros would like to.

A Flat Network or a Secure Network? Why Not Both.

August 20, 2014 No Comments

For the first time last year, the Office of the Comptroller of the Currency singled out cybercrime as a top bank risk. This year regulators went further, specifically targeting potential network intrusions. Our own research conducted with the Ponemon Institute found that nearly 70% of critical infrastructure organizations surveyed have reported at least one security breach that led to the loss of confidential information or disruption of operations in the past 12 months.

How to use Virtualization to Create a Simple and Highly Reliable Disaster Recovery Plan

August 18, 2014 No Comments

Disaster Recovery isn’t just a buzzword, it’s the difference between surviving a data breach, data loss, or catastrophic event like a hurricane; or ending up as one added statistic to the list of organizations that closed their doors after something goes wrong. Yet, according to a recent study, most organizations do not have an adequate DR plan in place. One underutilized DR solution is to leverage virtualization the right way. Learn more about how Backup Exec can help.

Deconstructing big time data breaches: Where the big boys failed and what your business can learn

August 14, 2014 No Comments

These days, it seems not a day goes by without a data breach story appearing in the news. As these security incidents become more prevalent – not to mention more costly – one of the best things that small businesses can do to prevent them is to learn from others’ mistakes.

IT Briefcase Interview: Mobile Website and Custom APIs Monitoring

August 11, 2014 No Comments

In this interview, Zaheeruddin Ahmed B, marketing analyst at Site24x7, a ManageEngine cloud service, discusses the need for a way to monitor mobile apps and mobile-optimized websites — from the perspective of the mobile user — and his company’s efforts to do just that with its industry-first mobile monitoring solution.

To Cloud or Not to Cloud, That is the Question

August 11, 2014 No Comments

By Joe Caserta, Caserta ConceptsOne of the biggest decisions any business will need to make this year is where to store the company’s data. Is renting space in the Cloud the answer, or is it best to keep data in-house by investing in the appropriate infrastructure? Read More >>>

As Cybercrimes Soar, It’s Time to Rethink DIY (or BIY) Network Security

August 4, 2014 No Comments

Cyber-attacks and fraud maneuvers continue to climb in frequency and sophistication as cybercriminals keep penetrating vulnerable targets. As a result, the annual global cost of cybercrime rises continually and approaches a conservative $400 billion a year. Every day, 1.5 people become victims, and each year, more than 232 million identities are exposed.

Context-Aware Security: A Key to Successful BYOD

August 4, 2014 No Comments

by Neal Foster, DELL SoftwareHow can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day. Read More >>>

Threat Intelligence: The Key to a Complete Vulnerability Management Strategy

July 29, 2014 No Comments

Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.

The 2014 Application and Service Delivery Handbook

July 28, 2014 No Comments

This is the eight edition of what had previously been called the Application Delivery Handbook.

Data Centers in the Crosshairs: Today’s Most Dangerous Threats

July 28, 2014 No Comments

This paper analyzes the top five most dangerous threats to your data center.

Keeping Open-Source Safe

July 28, 2014 No Comments

With the recent spate of vulnerabilities found in OpenSSL, the security of open-source software has been put under the magnifying glass, with industry experts and software developers weighing the merits of using an open-source versus a proprietary code base. There are valid arguments for both, but ultimately the risk of a vulnerability can be the same whether rooted in proprietary or open source code.

What to do when you rely on Internal Names in TLS/SSL Certificates

July 28, 2014 No Comments

A deadline set by the CA/Browser Forum for the use of Internal Names is quickly approaching, and many system administrators need to understand how best to adapt to this change. At the same time, hundreds of new top-level domains are being launched, which redefines what constitutes an Internal Name. In this post we’ll explain what the changes are, why they’re being made, and how you can update your systems in response to the problem.

How to do SIEM on a Shoestring Budget

July 28, 2014 No Comments

by Nicole Pauls, SolarWindsSecurity information and event management (SIEM) software can seem like the perfect solution to smaller IT shops where resources are at a premium and where IT pros are constantly asked to do more with less. However, the reality they encounter is often anything but. Read More >>>

Globalizing the Continuous Delivery Pipeline

July 23, 2014 No Comments

by Rob Vandenberg, LingotekThanks to trends like BYOD and cloud computing, devops now works together as a unified organization, rather than throwing code over an invisible wall. It’s a necessary and timely evolution—especially for today’s sophisticated global IT environments. Read More >>>

How can Big Data cross the Oceanic Gap?

July 2, 2014 No Comments

By Yves de Montcheuil, TalendBig data technologies are definitely California-born. The Internet giants invented Hadoop and most NoSQL databases. Over the years, adoption has spread from “new economy” companies to almost all industries. Read More >>>

Where Do You Fall Within the Data Protection Divide?

July 1, 2014 No Comments

Ipswitch recently conducted a survey of more than100 IT professionals unveiling that employees feel an overwhelming sense of personal responsibility to protect corporate information or data. While accountability was high (84 percent) from an individual standpoint, 42 percent of respondents indicated that their organization does not mandate methods for securely transferring corporate files or have an automated system in place to mitigate the risk of human error.

BYOD Security Risks: Companies May Be Playing with Fire

June 26, 2014 No Comments

The BOYD policy has already become a substantial factor in the corporate world, with there being enough documented evidence to establish the fact that it gives a significant boost to employee’s productivity. As more and more companies are warming up to the idea of allowing personal mobile devices in the workplace, the security implications of adopting such a policy are becoming increasingly hard to ignore. Indeed, companies are putting a lot at risk for getting a bit more out of their employees.

Where does Security fit in DevOps?

June 24, 2014 No Comments

By Eric Minick and Diana Kelley, IBMOrganizations are under increased pressure to continuously create and deploy innovative products, software, and apps. This added pressure makes it increasingly important to embed security throughout the entire development process. Read More >>>

Simplifying the Development and Publishing of Apps for Businesses Today

June 24, 2014 No Comments

As digitization and mobility in companies become all pervasive, and IT departments continue to strive to do more with less, the shortage of IT skills to support Mobile Apps development and publishing is an increasingly acute issue.

Top Tips for an Effective Cloud Migration

June 11, 2014 No Comments

By Sarah Lahav, SysAid TechnologiesFor organizations built on in-house IT solutions, making too many changes too quickly can introduce unknown risks and frustrate end users who need to learn new software. The transition to the cloud therefore calls for a strategy. Read More >>>

How Greed, Generosity and the Defense of Civil Liberties Can Put Your Data at Risk

June 10, 2014 No Comments

By Cam Roberson, Beachhead SolutionsSome human traits are security hazards – but not always because they are faults. As a matter of fact, some traits directly and deliberately engineer situations in which data leaks are more likely. Read More >>>

Cloud Security Readiness Tool

June 3, 2014 No Comments

The Cloud Security Readiness Tool evaluates whether cloud adoption will meet their business needs.


Gartner Identity & Access

TDWI World Conf San Diego

Gartner IT Financial Procurement Asset Mgmt Summit

Gartner Catalyst

Red Hat JBoss Busines Automate

ACI Customer Experience Management Summit


ITBriefcase Comparison Report

IBM Data