Information Technology Editor's Pick


Subscribe to the InfoTech eNewsletter

Editor's Pick

Kordia Joins Asigra Partner Ecosystem to Deliver Backup and Recovery Services
July 1, 2015 - 5:29 PM
Before digital technology became widely available, if there was ever a disaster at a particular location, the recovery process was slow and very expensive. Even though there were mechanisms in place to store sensitive documents off-site, the possibility these facilities could suffer the same fate was very real. But digital technology now makes it possible to implement backup and recovery solutions in place at multiple locations to ensure availability at all times. One of the companies that makes this possible is Asigra Inc., a cloud backup, recovery and restore software provider since 1986.

Wheelings & Dealings: Cloud Technology Partners Scores $3.5 Million Funding Round to Scale Out Operations
July 1, 2015 - 3:36 PM
Cloud services provider Cloud Technology Partners has received a $3.5 million top-up round of funding, the company announced. The firm specializes in cloud projects for enterprise clients, largely in the Fortune 500 segment. It also works closely with infrastructure providers AWS, Google Cloud Platform and others to promote adoption of both public and hybrid cloud services.

Three Steps to Prepare an Enterprise for Digital Revolution
July 1, 2015 - 3:32 PM
Business innovation through digitization and the reimagining of business processes driven by data has become a necessity for every organization across a variety of industries. Consumers have led the business in this charge, leaving businesses with no choice but to respond or perish.

Wheelings & Dealings: Cisco Targets OpenDNS in Nine-Figure Acquisition
July 1, 2015 - 9:17 AM
Network security is front-of-mind for a lot of companies and individuals alike these days, and Cisco is no different. A new report direct from Cisco says the company is looking to pick up network security firm OpenDNS in a deal valued at $635 million in cash, which is expected to conclude in the opening days of 2016.

Evolve IP Launches IT-as-a-Service
June 29, 2015 - 6:06 PM
Evolve IP, a service provider of cloud-based resources for IT departments, recently announced the launch of its IT-as-a-service (ITaaS) program which will give those same departments access to outsourced management services and self-administration tools.

Report: Facial Recognition Market About to See Huge Jump
June 29, 2015 - 10:46 AM
While facial recognition software is not actually that new, it is apparently going to be seeing a resurgence in popularity over the next few years according to a new report. The technological breakthroughs that led to facial recognition back in the 1980's and 1990's has seem some serious advances in the 2000's while the tech has also become less expensive to integrate. This is why industry analyst Tractica says that adoption of facial recognition is going to be particularly strong when it comes to mobile device authentication.

Five New Stats on Project Portfolio Management in 2015: Lack of Resources and Alignment Challenges
June 29, 2015 - 10:10 AM
There continues to be a high rate of failure for IT projects and lack of resources for project management, according to a new survey by Innotas. The survey also revealed the lack of a methodology to score and prioritize projects, showing that many organizations still do not have an approach that enables project success. These five key findings from the survey illustrate the trends-and the challenges-facing organizations' project portfolios and project management strategies:

People, Process and Technology: A Recipe for Security
June 29, 2015 - 6:00 AM
Data security is a hot topic, as seemingly every week a report announces yet another hack of sensitive information. Whether it's the enterprise, government or Joe Plumber, security must be front of mind. One company, providing protection to firms of all sizes is managed service security provider, Alert Logic.

IBM Announces Its Version of Container Technology
June 29, 2015 - 6:00 AM
IBM announced recently that it had created enterprise class containers to facilitate application development in hybrid environments. The company's efforts to push container technology are part of a larger movement that seems to be gaining popularity with many businesses.

Amdocs Helps CSPs Migrate to New Data Warehouses, Leverage Big Data for Marketing, Sales & Network Planning
June 25, 2015 - 9:11 AM
Communications service providers' existing data warehouses are hitting the wall as the amount of data they need to house and share multiplies. Amdocs is helping these companies upgrade to newer systems that are up to the task, assisting these businesses in transitioning their data from legacy to next-generation data stores, and providing a wide array of platforms and applications to help businesses use big data to their advantage.

Free Your Data
June 23, 2015 - 11:46 AM
AgilData CEO Dan Lynn's presentation on the main stage of Cloud Expo NYC starts off with a black and white video clip of Bruce Lee explaining the agility of water. He says with his indelible charm, "Water can flow or it can crash. Be water my friend."

LogMeIn Named One of 'Best Places to Work' for Eighth Straight Year
June 22, 2015 - 2:34 PM
The Boston Business Journal released its annual list of "Best Places to Work" earlier this week, and, for the eighth consecutive year, LogMeIn, Inc. found itself among the top 3 amongst all large companies. LogMeIn's CMO, W. Sean Ford, was elated at the news, saying "It is an honor to be recognized among Boston's elite businesses as a top place to work." The company is one of the largest cloud software companies in Boston and the largest in the Fort Point district, employing nearly 600 people.

Parkour for Enterprise Networks
June 22, 2015 - 1:54 PM
Just as the French discipline of parkour identifies the most efficient route from point A to point B, Tel Aviv based network security company Tufin automates secure application connectivity over an enterprise network. And like parkour-the subject of viral Internet videos of athletes scaling skyscraper facades and hopping between rooftops-the idea, in theory at least, is to do this as safely as possible.

The Inside Job: The Biggest Threat to Cybersecurity?
June 22, 2015 - 12:49 PM
For most of us, threats to our computer systems come from the outside in. We're concerned about viruses, about malware, about distributed denial of service (DDoS) attacks that can cripple our systems without proper vigilance. But what we don't commonly consider is the attack that comes from the inside, and a new report from Crowd Research Partners suggests that this may actually be an even bigger threat to our systems' way of life.

Biometric Security Getting Bigger, Faster
June 22, 2015 - 10:39 AM
When it comes to lock-down security in mobile devices, both people and companies are looking towards biometric security more and more every day. A new report by industry analyst Tractica underlines this trend, estimating that fingerprint readers in mobile devices will surpass the 1 billion units shipped per year mark by the end of 2021. This report also claims that this growth will mean that more than one-third of all mobile devices sold around the world will include fingerprint scanners.

Survey Shows Workers Happier With In-House IT Departments
June 22, 2015 - 10:28 AM
Despite the perception that company employees are growing ever more annoyed with company IT departments, a new survey run by LANDESK shows that employees are actually quite happy with their in-house IT departments. In fact, the report shows that more than 80 percent of employees gave their IT departments an "A" or a "B" when asked to assign their IT departments a letter grade.

A Security Manifesto: Why Are Breaches Inevitable?
June 19, 2015 - 5:30 PM
Face the facts: at some point, sooner or later, your system will be breached. It's no longer a question of "if", but rather "when". Why? It has to do with the very nature of the Internet itself, the increasing complexity of our connections, and a growing web of software and hardware that daily adds openings into the silos we expect to be interconnected and secured all at once.

Attempting to Accelerate API Development?
June 18, 2015 - 4:22 PM
An application programming interface (API) is the mechanism through which applications or programs communicate and exchange information. In today's digital economy which is powered by mobile and cloud applications, APIs have become the fabric that brings and connects the disparate digital pieces together. While facilitating this data interchange is essential, it is critical that it is done in a secure fashion, allowing only access to data that is authorized and appropriate based on the context of operation.

Decision Engineering Can Help Organizations Make Better Choices
June 18, 2015 - 10:07 AM
It's time for companies to stop relying solely on spreadsheets to make decisions and start using new methods, according to several management experts.

LastPass is the Latest Security Provider to Get Hacked
June 18, 2015 - 9:37 AM
The latest company to announce its assets were compromised is LastPass, a platform used to secure the personal information of individual consumers and organizations.

IBM Expands European Presence with New Data Center in Italy
June 18, 2015 - 9:09 AM
IBM has made yet another move geared toward strengthening its global presence when it comes to working in the cloud. The firm has also strengthened its standing in the European Market by opening its very first cloud data center in Italy. This particular center is located right in Milan and the cloud data center means that there is now an IBM presence in the region.

The Perks of Being an Open Source User
June 17, 2015 - 3:37 PM
The world of enterprise IT is seeing a growing trend when it comes to using open source products over proprietary alternatives. Proprietary products play an important role, of course, but they certainly aren't the only, or the best, option.

The Time is Ripe for Cloud Migration
June 17, 2015 - 10:59 AM
The cloud is a curious proposition for some, for others it is an opportunity to evolve the way services, software and infrastructure are maintained, managed and deployed. It would appear that cloud computing has reached the "tipping point," at least according to ProfitBricks' William Toll who believes 2014 has set the tone for a very cloudy future.

The IRS and Tax Prep Firms are Partnering to Make Your Tax Return More Secure
June 17, 2015 - 9:21 AM
The IRS's newest endeavor is geared toward finding people who are committing tax fraud. The agency is partnering with tax-preparation firms and software companies including Intuit as a way to combat refund fraud. This partnership is going to breed new safeguards that will be used to authenticate a user's identity when they are registering for a service such as TurboTax, including monitoring and flagging the repeated use of an IP while also looking at a device's identifying information.

PaaS No More: Azure Embraces Cloud Foundry
June 16, 2015 - 4:36 PM
At the end of May, Microsoft announced a coming public preview of Cloud Foundry, an open-source PaaS that runs on an Azure deployment. Ironically, Azure began as a platform for developing applications and running them in the cloud. The Cloud Foundry preview shows just how far Azure has come in the past seven years and how it has changed from its early PaaS days.

Ovum Debuts IT Spending, Staffing Benchmarking Tool
June 15, 2015 - 6:27 PM
When deploying IT in the enterprise, gaining sign-off among the C-suite is often easier said than done. Demonstrating a clear ROI case in terms of operational savings is a must-but it's also necessary to show its role in other business outcomes, like customer satisfaction. And that's where metrics come in.

If Dinosaurs Had Big Data, Would They Be Extinct?
June 15, 2015 - 11:05 AM
Data has many uses, many of which have yet to be conceived. From better understanding your customers, to preventing fraud or keeping systems running and up-to-date, big data is helping industries move forward every day. According to a recent big data study, 79 percent of respondents agreed that companies that don't embrace big data might share the same fate as dinosaurs.

Wheelings and Dealings: Security Entrepreneur Nabs Brivo for $50 Million
June 15, 2015 - 6:00 AM
Eagle Eye Networks CEO and Barracuda Networks founder Dean Drako is expanding his reach in cloud surveillance and security with the acquisition of Brivo, for $50 million.

Huge Gains Forecasted for Cyber Security Market
June 11, 2015 - 2:47 PM
In a time when even a major figure like Kaspersky Lab isn't safe from outside intrusion by hackers, it likely won't come as a surprise to hear that the cyber security market is expected to grow by leaps and bounds, and in the very near future. A new report from MarketsandMarkets, meanwhile, suggests that the growth is going to be major, and will occur rapidly.

Wheelings & Dealings: Illusive Gets New Series of Funding from Team8
June 11, 2015 - 10:52 AM
Deception technology specialists Illusive obtains $5 million in Series A funding from Team8.

FinalCode Secures Enterprise File Sharing for Pioneer
June 10, 2015 - 2:55 PM
All businesses need to share information with partners to successfully compete; however, no business wants to unknowingly disclose confidential information to unauthorized users. Pioneer has actively responded to this problem by deploying FinalCode file security to maintain control over intellectual property even while it resides outside its network. FinalCode is impressive in its ability to cryptographically secure sensitive files and apply a broad set of entitlement controls inside the network and on remote devices while allowing the customer maximum freedom in its choices of enterprise content management, cloud storage and collaboration systems.

Best Practices for Application Archiving
June 10, 2015 - 9:27 AM
The tremendous growth in volumes of data-both traditional structured data and new data types such as Internet-of-Things (IoT)-and the advent of in-memory database technologies like SAP's HANA and NAND flash storage that are faster but more expensive has made data archiving mandatory. Companies simply cannot afford to operate as they once did, allowing years of data, much of it seldom used, to accumulate in single-tier databases. The old data clogs systems, hurting performance, and, when that database is running on flash or in-memory, it also becomes prohibitively expensive.

Real-Time Flow Analysis is Key for High Availability of E-Commerce Web Apps
June 9, 2015 - 9:57 AM
High availability of applications is a technical issue that can keep you awake at night. For e-commerce retailers, downtime means lost revenue-and damage to a retailer's reputation-with a customer's inability to conduct transactions during an outage.

IBM Acquires Hybrid Cloud Provider Blue Box
June 8, 2015 - 10:07 AM
IBM is one of those companies that does plenty when it comes to innovating all on its own, but the firm learned long ago that sometimes the best strategy is to buy companies that specialize in one area or another. That is apparently the impetus behind the firm announcing the purchase of Blue Box-a managed private cloud company that has a platform built on OpenStack.

New Threat Intelligence Platform from BrightPoint Security is Timely
June 8, 2015 - 6:00 AM
There is an old saying that I have taken the liberty of tweaking that timing is "E"verything in life. This week, thanks to the revelations about the successful hack of U.S. government employee confidential personal information at the Office of Personnel Management (OPM), to say the timing of new threat intelligence insights and capabilities is timely might be one of the year's great understatements.

Social Networking, IM and Anonymizers Open Doors for Enterprise Hacking and Malicious Threats
June 8, 2015 - 6:00 AM
Mobility and cloud computing are two of the biggest technology trends, changing the way business is done and the way enterprise networks are set up. They also pose a security threat and can give employees access to sensitive company info while also opening doors for hackers and malicious traffic.

The AARP Wants Crackdown On Online Dating Scammers
June 5, 2015 - 11:33 AM
While there are plenty of happy stories surrounding online dating sites like, organizations including the AARP are calling for stricter controls by these sites because of the opportunity to defraud people who are just looking for romance. One report estimates that online dating scammers actually raked in as much as $82 million in just the second half of 2014.

Gartner: Server Shipments Up in Q1 2015
June 3, 2015 - 6:00 AM
A new report issued by industry analyst Gartner that says worldwide server shipments grew by more than 13 percent year over year in the first quarter of 2015.

Beware of Cloud Click Throughs
June 2, 2015 - 11:51 AM
Slowly, with respect to security standards this situation is improving. In March of this year, Amazon's AWS Data Processing Agreement was approved by the Article 29 Working Party (WP29), a coalition of European Union data protection authorities. The changes will comfort customers that Amazon uses high standards of security and privacy as their data moves through or outside the EU, according to the company. This is a big step forward in the right direction.

The Critical Difference Between Compliance and Vigilance
June 1, 2015 - 8:26 AM
The word "compliance" rings out across the payments industry like a clanging bell that cannot be silenced. It might be better compared to the bell of a town crier yelling out a list of demands on behalf of an absolute ruler. The presumption is that to be compliant is to be protected, so merchants follow the orders. But as breach after breach hits the headlines, it has become clear that compliance is not a synonym to security.

Cybersecurity Market Report
May 29, 2015 - 2:29 PM
The worldwide cybersecurity market is defined by market sizing estimates that range from $71 billion in 2014 to $155+ billion by 2019.

ObserveIT Fills Void in AWS Security with CloudThreat Solution
May 28, 2015 - 5:19 PM
ObserveIT announced recently that it had launched its CloudThreat security solution for Amazon Web Services. The new solution fills a void where many cloud environments had previously been left unprotected.

Architecture Study Shows Ongoing Need for Cloud Solutions
May 28, 2015 - 9:06 AM
In an increasingly cloud-based solutions world, are vertical markets best/better served by horizontal cloud-based solutions that can be customized, or by unique cloud-based capabilities designed to meet extensive and very specialized needs?

Commvault Provides Security and Compliance in the File Sync and Share Solution Market
May 27, 2015 - 6:19 PM
The Internet and affordable computing devices have increased the amount of data we create exponentially. While this has presented many opportunities for analyzing the information to gain valuable insight, it has also introduced considerable challenges on how to store, protect and make the data available with greater efficiency.

Best Practices for Maintaining an Effective ERP Implementation
May 26, 2015 - 6:20 PM
Long ago, the ERP landscape was very scant, serving only the largest of companies. Innovations we have experienced in the last few years has vastly altered this landscape, allowing enterprise resource planning to be a part of virtually any company of any size. This has led businesses to make better decisions with regard to their human resources, business practices, and allocation of capital for various projects and activities. It's very difficult to overestimate the effect and savings this resource has had on operators in every industry.

The Gap Between Enterprise Security and Employee Actions
May 26, 2015 - 5:04 PM
According to recent research from SOTI, there is a serious gap between the precautions businesses take to protect their data and the actions their employees take with company data.

BMC Releases Remedy 9 Service Management Solution with Modernized Design
May 22, 2015 - 2:18 PM
BMC recently announced the release of the latest version of its service management platform, Remedy 9. A rich set of analytics combined with an appealing user interface are a couple of the many new features of the updated solution.

IBM Recognized as a Leader in the Digital Transformation Implementation Market
May 22, 2015 - 1:39 PM
International Data Corporation (IDC), a provider of market intelligence, advisory services and events for the IT, telecom and consumer technology markets, has published a new MarketScape report that takes an in-depth look at the operations of vendors in the digital transformation implementation market. Known as the "IDC MarketScape: Worldwide Digital Transformation Consulting and System Integration Services 2015 Vendor Assessment," the report studies both quantitative and qualitative characteristics that explain success by covering a variety of vendors with a comprehensive evaluation process.

Managing Risk May Get Easier with New IBM and Deloitte Project
May 20, 2015 - 2:22 PM
Risk: it's not just a board game anymore. For businesses, it can represent the difference between profit and loss, even between being a viable business or being closed outright. But managing risk can be a difficult thing, and that's where a new step in IBM and Deloitte's long-standing team operation comes into play as the firms bring out a powerful new risk intelligence tool.

5 Building Blocks for a Successful Product Development Partnership
May 20, 2015 - 12:53 PM
More and more these days, product development is approached as a collaborative partnership. Gone are the days when a list of requirements would be sent off to the product development firm with little or no interaction between engineers and industrial designers until it's time to review results.

From Virtualization to the Cloud: Use IT Resources More Efficiently
May 19, 2015 - 3:29 PM
Server virtualization leads to a long-term increase in business agility while providing the foundation for taking the first step toward cloud computing. A growing number of companies are switching to an open source-based hybrid cloud infrastructure and therefore will need tools to manage it.

QLogic and Cavium Joint Infrastructure to Accelerate Cloud Storage Applications
May 19, 2015 - 6:00 AM
A new collaboration between QLogic and Cavium will deliver accelerated performance for enterprises and cloud storage applications by combining technologies from both companies.

Dimension Data, NTT DATA to Create Cloud Migration Services for SAP
May 18, 2015 - 6:19 PM
Dimension Data, a global provider of information and communication technology products, recently announced that it will soon join its sister company NTT DATA to create a new set of services, which can speed up and lower the costs of migrating applications to the SAP cloud.

Global Capacity, Equinix Develop Ethernet Solution that Gives Direct Access to Cloud Providers
May 14, 2015 - 5:49 PM
Global Capacity and Equinix announced recently that they were teaming up on a solution to give customers direct access to the Equinix Cloud Exchange. By using an Ethernet connection instead of public Internet service, customers can have a more direct connection to cloud providers.

Google's New Approach to Enterprise Security: The BeyondCorp Initiative
May 13, 2015 - 6:31 PM
When we think of corporate security, we normally tend to think about firewalls and other tools as means to protect the network. It seems however, that for every person working to ensure that the firewalls hold back threats, there are at least two hackers who have already figured out how to get through.

New SANS Survey Highlights the Risks of Unmanaged Computing Devices
May 13, 2015 - 6:25 PM
Organizations that have a digital presence have come to terms with the fact that eventually they will experience a security breach. The issue is not if it will happen, but how they will react to the breach to minimize the damage. As the threat landscape continues to grow in sophistication and severity, it is essential to take proactive measures that take into consideration the events that will take place before, during and after an attack. A new survey by SANS Institute titled, "Securing Portable Data and Applications on Enterprise Mobile Workspaces" has revealed a large number of corporate and employee computing devices still remain unsecured.

ESI Releases Educational Materials for Resellers
May 12, 2015 - 5:22 PM
Estech Systems (ESI) is known for the cloud-based private branch exchange system it launched in 2014. With that entry, it has begun to shape a new market where the cloud is paving the way for a new type of PBX that does not have to run on a business's premise. Therefore, it is essential for the communications provider to give its resellers the right tools to advance that product.

Xangati Analytics Engine Verified as Citrix Ready
May 12, 2015 - 4:41 PM
Virtualized data centers that support a hybrid blend of private and public cloud infrastructure are becoming more and more common, and organizations are looking for better analytics and insight to support increasingly complex environments. Xangati specializes in providing virtualization performance monitoring as well as service assurance analytics, and the company has just been verified as Citrix Ready.

The Unexpected Costs of Moving to the Cloud
May 12, 2015 - 9:14 AM
A few years ago, companies thought the cloud might help save on costs. No doubt everyone recalls the plethora of articles with titles such as: "How to save time and money in the cloud" or "Cloud Computing can generate massive savings". Analyst studies from leading think tanks from the likes of Booze Allen Hamilton and The Brookings Institute also supported the notion that moving to the cloud will result in massive cost reductions in IT spending.

Is the End-to-End IT Solution from One Vendor the Right Choice?
May 11, 2015 - 9:05 AM
Large organizations should follow a more advanced approach when selecting the required technology and focus not only on the technical side or the initial costs but also on the total cost of ownership and the return on investment. Obviously, this requires advanced resources that perform technical and commercial analysis.

How Can You Tell When a Hacker is Working in Your Email?
May 8, 2015 - 2:23 PM
Email hacking seems to be everywhere these days, with hackers showing no signs of slowing down. Whether you are a large organization or a small or medium sized business (SMB), having your email account hacked can undermine the loyalty of your existing customers, and it can affect your ability to attract and retain new customers as well.

The Road to an Intelligent Infrastructure: First Stop, Automation
May 7, 2015 - 3:21 PM
Although developing intelligent capabilities can be a challenging undertaking, the good news is that the basic elements of intelligent infrastructures are goals that most CIOs have already been working towards: standardization, consolidation, automation, virtualization and service orientation. The business value lies in putting those pieces together into an integrated solution and then managing them effectively to deliver positive business outcomes.

Record Amounts of IT Staff Stressed Out and Considering Leaving Jobs
May 7, 2015 - 12:52 PM
The IT world can be a stressful workplace for many, but the results of a new survey from GFI Software reveal a pretty glum picture. The company conducted its fourth independent IT Admin Stress Survey and discovered that 78 percent of those queried deal with workplace stress, while a whopping 82 percent are thinking of leaving their IT jobs because of stress and dissatisfaction with their working conditions. That number is up from 78.5 percent last year.

Google Creates More Efficient Big Data Solution with Cloud Bigtable NoSQL Offering
May 7, 2015 - 6:00 AM
Managing big data is becoming more and more of an imperative, and organizations are scrambling to find better and more efficient database solutions. Google has been at the forefront of development with its Bigtable initiative, and has now announced Cloud Bigtable, a new NoSQL database solution. Powered by the Bigtable data storage system, the new offering promises to provide single-digit millisecond latency.

Unlocking Israeli High Tech's Secret Advantage
May 6, 2015 - 1:56 PM
Several years after the world first took notice of the economic miracle in Israel, Israeli startups continue to enjoy an astonishing growth trajectory. The Israeli tech sector had its best year ever in 2014, posting a record $15 billion in exits, nearly twice the total in 2013 and three times the country's 2012 combined exit value. The wave of tech startups, innovations and exits is continuing this year.

Businesses Are Adopting 'Digital Employee Software' to Increase Productivity
May 6, 2015 - 12:11 PM
Every company wants to help their employees be more productive, and adopting the most current IT infrastructure is one way to do that. The problem occurs when budgets limit their ability to invest in new technology.

XO Communications Offers Dedicated Links, Security to Azure Cloud
May 6, 2015 - 6:00 AM
The Microsoft Azure cloud computing platform allows businesses to deliver cloud-based applications throughout their enterprises by leveraging the power of Microsoft-managed servers. The creation of Azure has allowed companies such as XO Communications to capitalize on those strengths and offer enterprises dedicated connections to the Azure cloud itself.

CIOs and IT Managers in the Middle East Need to Close the IT Relevance Gap
May 5, 2015 - 12:03 PM
We are entering the era of the "third platform", which also has distinct hallmarks in terms of innovation: Cloud, Mobility, Social, and Big Data are all a part of it. Gartner calls these elements the "Nexus of Forces" and advocates the need for enterprises to become digital businesses in order to survive this next wave of disruption.

Achieving Consistency Across the Data Center's 'Four Footprints'
May 4, 2015 - 1:18 PM
A natural reaction to the ever-growing complexity of enterprise IT is the desire for a consistent management strategy and architecture, especially as infrastructure goes through the metamorphosis it's in right now.

Display Technology Review: Philips' E-Line IPS Monitor Sound, But with Minor Issues
May 4, 2015 - 12:56 PM
Philips is widely known for its audio and visual equipment, from televisions to projectors to home theater gear. But its line of monitors is somewhat less well-known. That's a point that should be addressed in short order, and one that will be: our friends out at Philips sent over an E-Line IPS monitor for us to review, and it has a lot to like. But it's also going to have a couple sticking points to watch out for.

Top 10 Security Concerns
May 4, 2015 - 12:34 PM
In the world of Information Technology (IT) threats are constantly evolving. In some cases the existing threats become more advanced and in other cases new forms of threats are formed.

The Agile User Experience Approach
May 1, 2015 - 3:21 PM
An effective User Experience increases platform adoption, builds affinity for the brand and helps the user prevent mistakes through fault tolerance. A great example of strong UX is the "kill engine" button typically found on heavy machinery. Granted, it's not software, but its size, shape and bright red color imply that even a panicking pencil pusher can smack the machine into full stop when his tie gets sucked into the contraption.

Cloud and Hybrid Business Continuity Solutions Will See More Investments From SMBs
April 30, 2015 - 3:53 PM
For those of you who are old enough to know that carbonite was the mining substance that froze Hans Solo (look up the reference if you do not know it), you can now associate the name with a company known as an online backup service, available to Windows and Mac users, that backs up documents, e-mails, music, photos, and settings. Yes it was named after the fictional substance used to freeze Han Solo.

Appian Finds that Business Execs and IT Disagree on Custom Software Investment
April 30, 2015 - 10:30 AM
Custom software drives businesses across all markets, and both business executives and IT decision makers appear to know the value of such software. Both groups, according to a recent study by Harris Poll on behalf of business process management software developer Appian, believe that custom software is driving innovation in technology and allows businesses to easily make software enhancements, deliver better customer service, and run efficient operations. Where they disagree, however, is in how to invest in custom software.

Hosting Cheat Sheet
April 30, 2015 - 10:12 AM
Companies have many options when it comes to choosing the hosting option that best meets their needs-from getting started to long-term viability. These options range from cloud hosting to managed hosting to a do-it-yourself approach.

Cloud X Fusion Offers Direct Access to Google Cloud Platform
April 29, 2015 - 12:01 PM
As the owner of the world's largest private undersea cable system, spanning more than 67,000 route kilometers (41,000 miles plus), Global Cloud Xchange (GCX) has introduced Cloud X Fusion, which allows enterprise grade connectivity with direct access to Google Cloud Platform.

Russian Hackers Have President Obama's Unclassified Emails
April 28, 2015 - 10:32 AM
No one has to convince the Obama administration that hackers are posing a problem to everyone in the world. The administration has been actively trying to make sure that those who are acquiring ill-gotten information are not profiting. All of this is in addition to recent revelations that Russian hackers who were able to access the White House's unclassified computer system actually read some of President Obama's email correspondences.

Undocumented System Changes on the Rise, Putting IT Infrastructure at Risk
April 27, 2015 - 6:42 PM
An alarming trend among large enterprises that poses a major security risk has been revealed by a new survey from Netwrix Corporation. The company queried 700 IT professionals from more than 40 industries and discovered that 70 percent of organizations simply forget about documenting changes, up a whopping 57 percent from last year.

IBM's QRadar Offers Better Detection of Cyberattacks
April 24, 2015 - 12:32 PM
With so much of our lives online these days, the ability to protect against cyberattack is as important now as a night watchman was in the days before the Internet. Protecting assets and protecting property against vandalism or destruction were all important tasks, and such tasks now have Internet equivalents. Enter IBM, whose QRadar system now powers analogues to the real-world watchdog, using analytics technology to find potential cyberattacks and prompt reaction.

5 Things Enterprises Didn't Know They Could Automate
April 22, 2015 - 3:09 PM
IT automation isn't new, but it's found its way into some of the most innovative aspects of computing today. Beyond managing repetitive tasks such as job scheduling, automation can now streamline processes across the enterprise, leaving IT teams with more time and resources to focus on the big picture. Read on to see how you can automate these 5 IT processes:

The Gap Between Perception and Reality of Perimeter Security Effectiveness
April 20, 2015 - 9:31 AM
Information systems have always been subject to attacks and breaches. Some tend to go under the radar, while others attack information that is not of any use, but the unfortunate fact is that they happen. A couple of Christmases ago this was really brought to light when Target was breached, and hundreds of customer accounts were accessed.

DNS Security and Cloud Network Automation: Two Imperatives for Middle East Service Providers Today
April 20, 2015 - 8:46 AM
Service Providers in the Middle East today are putting a lot of investments into two technology areas - Security and Cloud Computing.

Cyber Threat Week in Review
April 17, 2015 - 1:32 PM
Next week is the annual RSA gathering of security professionals in San Francisco. This can only mean two things.

Is SSL Hurting More Than Helping Middle East Organizations?
April 16, 2015 - 7:33 AM
Regional security expert sheds light on SSL encryption that is being commonly used by organizations in the country

Eight Key Factors to Lead You to a Successful Hybrid IT Environment
April 14, 2015 - 1:04 PM
IT Transformation is far more than moving some workloads and apps to a public cloud provider. Transformation is about learning to manage technology and business relationships in new ways. No longer are you solely managing within the confines of your own data center. You now function with support from different sources and locations, provisioning without IT intervention, introducing new apps without solid business cases and line of business (LoB) users provisioning their own workloads.

The Hybrid IT Enterprise Demands an End to Network Guessing Games
April 14, 2015 - 6:00 AM
Although enterprises are increasingly adopting cloud computing and SaaS-based applications, the bell has not tolled for on-premises IT. As a result, enterprises are creating hybrid infrastructure stacks that present a new set of challenges for IT, including an increased risk of costly data breaches, and architectural "collisions" where design patterns for on-premises development and deployment don't translate well (or at all) into cloud.

How Safe are your Email and Attachments? Can They be Found but not Lost to Bad Guy Actions?
April 13, 2015 - 5:28 PM
There are two really interesting phenomena at work when it comes to enterprise data. I hesitate to call them trends since what they really happen to be are business imperatives. Unfortunately, many times that can seemly contradict each other.

Is 2015 the Year of a Data Dystopia?
April 13, 2015 - 10:42 AM
The recent news headlines about cyber attacks and data breaches can't help but feel a bit too dystopic for comfort. The start of the year has prompted the question: Could our data be headed toward a dystopian future?

IDT Corporation Uses Hexadite to Accelerate Incident Resolution and Improve Security Operations
April 13, 2015 - 10:34 AM
When it comes to incident response (IR), enterprises end up wasting 80 percent of their resources because it takes much longer than it should to address attackers in their networks. This is because they've been trying to utilize people in ways that systems can automate instead of having them focus on the tasks that truly require human intelligence and interaction.

New Supercomputer Will Cost Energy Department $200 Million
April 9, 2015 - 6:05 PM
Argonne National Laboratory is a science and engineering research laboratory located near Lemont, IL. By size and scope, it is the largest national laboratory in the Midwest, and the initial inception of Argonne was to carry out Enrico Fermi's work on nuclear reactors as part of the Manhattan Project.

A Small Startup's Secrets to Scoring Big Name Clients
April 9, 2015 - 11:58 AM
Just a few big name clients can make or break a startup in the enterprise space. Landing business from Fortune 500, or even 100, corporations gives young companies validation and legitimacy, not to mention revenue. However, it is extremely difficult to land these clients as a small startup. Large corporations with large budgets also come with large needs, which means their CIOs and IT buyers are understandably skeptical that startups are up to the task.

Seeing the Light: How File Analysis Tools Can Unleash the Light in Dark Data
April 9, 2015 - 11:28 AM
Dark data is a relatively new term to the industry, defined by Gartner "as the information assets organizations collect, process and store during regular business activities, but generally fail to use for other purposes (for example, analytics, business relationships and direct monetizing)." Almost all organizations have volumes of dark data stored away in dusty vaults and off-site storage facilities that is historically unaccounted for, unmanaged, and undervalued.

Want to Buy a Corporate Password? Ask a Current Employee
April 8, 2015 - 12:40 PM
Passwords these days are a tricky thing. Sometimes passwords just aren't strong enough, and it can be difficult to keep track of all the various passwords used and when these should be changed. But there aren't many out there who'd be willing to sell an email password to a potential bad actor, at least, until the issue of work passwords comes up. Then it becomes of a different animal, and one that may pose a big problem for companies.

Looking For Better Cybersecurity? HP Has Some Answers
April 8, 2015 - 12:21 PM
With the sheer number of high-profile data breaches taking place lately-some even called 2014 the year of the data breach-it's only natural that companies would be looking for ways to improve cybersecurity. While there are plenty of methods out there to bolster the security measures, HP has an idea that might sound a little novel, but has a surprisingly rational basis.

Manage What You Measure with IPDR
April 8, 2015 - 11:08 AM
Cable providers are facing challenging times - and there's no quick fix in sight. The surging popularity of over-the-top (OTT) content is one of the biggest sources of additional bandwidth, with Netflix now accounting for more than one third of all downstream Internet traffic during peak hours in North America. It's no wonder, then, that bottlenecks form during evening hours and deteriorate service quality.

Swiss Re to Work with HWind Scientific to Develop Parametric Insurance Policies
April 8, 2015 - 8:53 AM
According to the insurance industry website Artemis, Swiss Re recently announced that it would be working with HWind Scientific to create a new set of parametric insurance and reinsurance products based on analysis of data from U.S.-based hurricanes and tropical storms captured by HWind. The new products are designed to speed up the process of paying out claims.

How to Build a Sustainable Storage Infrastructure
April 7, 2015 - 3:53 PM
In our personal lives we tend to love "how to" guides. In fact, one of the big trends of the past few years has been the raging interest in do-it-yourself (DIY) capabilities ranging from cookbooks to building your own airplane. The same has been true in the business world where the "For Dummies Books" have been a staple for years. In fact, it is how I became Microsoft Office proficient.

Open Source or Open Core: Why Should You Care?
April 7, 2015 - 12:58 PM
It is no secret that open source communities and projects are a different breed of development. Different people drive them. Some have a benevolent dictator, and others are driven by like-minded individuals. What is common is that the participants have an itch to scratch. They were dissatisfied with the status quo, driven by a meritocracy, and wanted to shake the constraints of a slowly evolving proprietary software environment. Quality of code and contribution drove what ended up in a product release, and transparency in software development is now a default in many modern enterprises.

What You Need to Know When moving Apps to the Cloud and SLAs
April 6, 2015 - 10:23 AM
It's no secret that many businesses are already moving their productivity applications to the cloud, or they are considering it at least. In Microsoft's latest earnings release, for instance, the company reported a whopping 114 percent rise in business cloud revenues in the second quarter of its fiscal year alone. That growth is being driven by Office 365, Azure and Dynamic CRM Online adoption, and represents an annualized revenue run rate of $5.5 billion.

30 Percent of Potential Cybercrime Victims Plan to Negotiate
April 6, 2015 - 8:51 AM
It's one thing to stand up and make bold pronouncements about how there will be no negotiation with terrorists, in the grandest action movie tradition, but when it comes to cybercrime, the actual response could be much different. A new report from ThreatTrack Security suggests that almost one in every three security professionals would sooner negotiate with cybercriminals who hold data hostage, whether the data has simply been encrypted or has been outright stolen.


Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter