Information Technology Editor's Pick


Subscribe to the InfoTech eNewsletter

Editor's Pick

The University of Tampa Plans to Bridge the Cybersecurity Workforce Gap
November 25, 2015 - 11:51 AM
The growing global IT security workforce shortage is no secret. As detailed in (ISC)²'s 2015 (ISC)2 Global Information Security Workforce Study-conducted by Frost & Sullivan and sponsored by Booz Allen Hamilton, NRI Secure and Cyber 360-we are looking at a 1.5 million shortfall of trained and certified security professionals by 2019. A key means for closing this gap is the (ISC)² Global Academic Program (GAP) from our community host which recently welcomed The University of Tampa as a new program member.

How Contact Centers Can Survive the Holiday Rush
November 24, 2015 - 11:32 AM
With the high shopping season around the corner, company call centers are bracing themselves for the deluge of traffic in the lead up to the end of the year and the world's busiest shopping period.

5 Ways to Secure the Public Cloud
November 24, 2015 - 10:43 AM
As cloud computing becomes more sophisticated and mainstream, the shift to the public cloud is gaining tremendous traction. With big-brand clouds (Amazon Web Services, Google Cloud Platform and Microsoft Azure) fast evolving, more and more enterprises are moving away from private clouds. However security is justifiably a top concern when moving applications and data into the public cloud. Some of the questions foremost on everyone's mind are - How secure is my data? What will happen is there is a breach with the public cloud vendor? How do I ensure that my data is properly protected in this case?

Study: Fed Suffers from Legacy Apps that are Hard to Modernize
November 24, 2015 - 9:59 AM
Federal agency IT managers understand that their legacy systems are ticking time bombs, according to a new study conducted by MeriTalk and sponsored by Accenture Federal Services, but most are struggling to actually fix the problem.

Secret Double Octopus Offers New Network-Level Security Solution
November 23, 2015 - 4:24 PM
Secret Double Octopus has come up with a new way to secure communications that goes beyond the power of encryption: network-level security.

Winning the War for Payment Card Data: The Trifecta of EMV, P2PE, and Tokenization
November 23, 2015 - 10:34 AM
Last year, the United States experienced what has been dubbed "the year of the data breach." Now, we're nearing the end of 2015, and data breaches continue to plague merchants. Some are saying that hackers' tactics are changing and that remote-access attacks are a new frontier in the fight for payment card data. But, these kinds of attacks aren't new - what's changed is the hackers' strategy.

Sisense Version 6 Opens Up Business Analytics to More Users
November 19, 2015 - 3:38 PM
Using business analytics tools can revolutionize the way business operates overall. It can allow certain trends to be more readily spotted and taken advantage of, improving business performance and key bottom-line metrics. Actually using these tools, however, can seem daunting to some. That's a development Sisense wants to fix with its newest version.

Cyber Attacks Growing More Dangerous for Individuals and Businesses
November 18, 2015 - 1:51 PM
Cyber attacks are becoming more impactful with a broader set of repercussions, according to new data from Trend Micro. The company has released its Q3 Security Roundup Report, finding that data breaches and other attacks are having a bigger impact on enterprise earnings as well as the physical safety and privacy of individuals.

Avanan Makes Enterprise Security Solutions Work in the Cloud
November 18, 2015 - 1:33 PM
Avanan made a global splash today, exiting stealth mode with a one-click solution for applying advanced security technologies to cloud and SaaS applications and data. The new company, which is based in New York City with research and development in Israel, aims to make legacy enterprise security solutions available for easy deployment in the cloud.

Fighting the Next War: Military Cybersecurity Spending on the Rise
November 18, 2015 - 11:38 AM
We're all actively fighting a war online, whether we know it or not. Criminals go after our personal information, our infrastructure, and our deepest secrets. It's a war that various portions of the military are taking more seriously, as spending on cybersecurity globally is expected to reach $10 billion in 2015.

Cylance to Protect Dell's New Endpoint Security Suite
November 18, 2015 - 10:29 AM
The way in which antivirus solutions try to stop malware is coming under great scrutiny. Cyclane, a security provider, has been implementing solutions to address those security concerns, which might explain Dell's decision to go with the company to protect the new Dell Endpoint Security Suite (ESS).

Varonis Enables Regulatory Compliance for Rabobank
November 17, 2015 - 4:20 PM
The international banking industry must abide by a number of regulations implemented in the wake of the financial crisis of 2007/2008. Varonis Systems is helping Rabobank, a Dutch multinational, address these new regulatory compliances with a solution that allows it to control its data access and permissions.

DDI Leader Infoblox Explains Security Challenges & Discusses Company Growth
November 17, 2015 - 4:17 PM
The DNS protocol was created more than 20 years ago to enable computers to more easily connect to one another. But no one at the time thought DNS would be used to connect so many things, so security was not a major consideration at that point. But now the use of DNS is widespread, and we're beginning to understand why implementing DNS security is important.

What Lurks in the Shadows: Advanced Cyber Attacks that Hide in SSL Traffic
November 17, 2015 - 4:08 PM
From Target (News - Alert) to Sony, and Anthem to Ashley Madison, no company is immune to the risk of cyber-attacks and the resulting loss of customer information. Network security solutions can reduce the risk of attack, but these solutions face an unexpected adversary: SSL encryption.

Vectra Helps Organizations Identify the Intruders that are Already in Their Networks
November 16, 2015 - 3:40 PM
To help organizations identify intruders so they can root them out, Vectra built software that uses machine learning and behavior analysis to identify patterns that occur during attacks and seek out intruders before they figure out what they want to destroy or steal and tunnel it out of the network.

SafeLogic Helps Vendors Move Faster
November 16, 2015 - 2:27 PM
Companies that offer security solutions can get to market faster by leveraging technology from SafeLogic, the company's CEO Ray Potter told me in an interview last week at TMC Editor's Day Silicon Valley.

Vidder Talks About the Challenges & Solutions for Enterprise Security
November 16, 2015 - 2:13 PM
When Vidder launched for business in 2009 as a consulting company that built secure networks for companies, many businesses thought its solutions were far more secure than was actually necessary. Today Vidder offers a software-defined perimeter service called PrecisionAccess, which is used to protect assets with a book value of $1 billion or more, and Fortune 500 customers clearly understand the need for this kind of security.

Integra Deploys Splunk Security Solutions
November 16, 2015 - 1:15 PM
Integra, a company providing the western U.S. with a wide range of networking, communications and technology solutions, recently announced that it has expanded its security operations center (SOC) by implementing Splunk Enterprise and Splunk Enterprise Security (ES). Brings Scalable Security to DevOps Teams Using AWS
November 16, 2015 - 11:33 AM
Tim Prendergast describes himself and co-founder Justin Lundy as former punk renegade kids. CEO Prendergast said he grew up in IT and went on to lead technology teams at Adobe, Ingenuity, Ticketmaster, and McAffee. CTO Lundy also worked at Adobe and has spent time defending the castle, as his bio says, at CA, MTV/Viacom, and CA.

Altiscale: The Big Data Utility
November 13, 2015 - 2:49 PM
Macaig illustrated that Spark is a big piece to this startup's success. He explained, "It puts a sharp point on what we do." Altiscale runs the three most recent versions of Sparks simultaneously, as to not force customers to worry about interoperability.

Gigya: Identity is Critical to the Customer Journey
November 13, 2015 - 12:22 PM
These three words succinctly explain what Gigya brings to the table for some of the largest consumer-facing companies in the world, explained CEO Patrick Salyer in an interview with me earlier this week at TMC Editor's Day Silicon Valley.

86 Percent of VP and C-Level IT Leaders Fear a Breach in the Next Year
November 13, 2015 - 9:19 AM
According to a report from Markets and Markets, the cyber security market is estimated to grow to $155.74 billion by 2019 at a CAGR of 10.3 percent from 2014 to 2019. Even with all that growth, a new survey just released by Promisec survey reveals there is still great concern from the majority of VP and C-Level IT leaders regarding the threat landscape in the digital space.

ServiceNow's Service Management Makes Better Use of IT Resources
November 12, 2015 - 2:08 PM
While the IT staff's purview in the past was largely relegated to tasks such as fixing fellow employees' computers and maintaining internal systems, now IT types are charged with helping fix the business. At least that's how Dave Stephens, vice president and general manager of service management at ServiceNow, sees it.

U.S. Leads in Service Management Uptake Beyond IT
November 12, 2015 - 1:26 PM
U.S. firms are leading the charge when it comes to applying service management suites-software that optimizes operational flow-outside of the classic IT domain. In fact, research has revealed that more than 75 percent of organizations in the U.S. are now using service management for optimized service delivery in at least one department outside IT.

Defining Organizational Requirements for File Transfer Failover and Disaster Recovery
November 11, 2015 - 1:58 PM
There are many reasons companies consider file transfer systems failover and disaster recovery. Here are a few things to consider when evaluating requirements for failover within a single datacenter or to a remote disaster recovery site for secure file transfer systems.

Don't Be a Sitting Duck - Learn How to Monitor Security Threats on Your Network
November 11, 2015 - 10:11 AM
The Internet is a wonderful thing, but not without its problems. We love being instantly connected to find the products we want, connect with those who deliver value, access information and stream entertainment. Unfortunately, to have this kind of access also means we're exposed to threats.

Wheelings & Dealings: Cybric Rakes in $1.3 Million
November 11, 2015 - 10:10 AM
Security virtualization and threat vulnerability remediation specialist Cybric has received $1.3 million in seed funding. The infusion will be used to speed up research and product development of the company's continuous security delivery fabric, which offers a unified view of enterprises' entire security infrastructure.

Centrify's Enterprise Identity Management Makes Work Easier, More Secure
November 11, 2015 - 9:59 AM
Centrify also earlier this month announced integration partnerships with cloud access security brokers CloudLock, Elastica, Imperva, Netskope, and Skyhigh Networks. Mann explained that while Centrify offers control and visibility into what's happening around attaining access to an application, these new partners address what happens once the user is inside the application.

Cryptzone Releases New Module for Security Sheriff
November 11, 2015 - 8:25 AM
Cryptzone, a developer of security software for Web development applications, recently announced that it has added a new module to its Security Sheriff software. The Site Module leverages the Microsoft Retail Management System (RMS) to allow users to share sensitive Microsoft SharePoint 2010 and 2013 data.

San Francisco Public Defender's Office Adopts NAKIVO VM
November 10, 2015 - 3:53 PM
The San Francisco Public Defender's Office has worked to defend San Francisco citizens in court for more than 90 years. To conquer the headaches associated with its previous virtual machine (VM) backup system, it recently adopted the NAKIVO Backup and Replication software that intends to act more properly in protecting the office's VMware environment.

What Companies Must Leave Behind to Migrate to the Cloud
November 10, 2015 - 10:51 AM
Moving business operations and processes to the cloud is never an easy task. There are always unclear steps, including the due diligence to vet solution providers, clearly identifying needs and ensuring the right tools are in place to protect the network and its users. The benefits are clear and measurable, as long as you have a proven path to get there.

Nigeria: A New Major Target for Cybercrime
November 9, 2015 - 4:00 PM
Kaspersky Lab recently released new information via its Kaspersky Security Network (KSN). The research shows that Internet users in Nigeria need to beef up their cybersecurity practices. Cybercrime is on the rise in the region, and threatens users on several different levels.

Disaster Recovery - Critical to the 'Always-On' Business!
November 9, 2015 - 3:22 PM
In the age of the 'Always-On' business, companies are facing new demands from end users including 24/7 access to data and applications and whom have no patience for downtime or data loss, all this while grappling with an exponential data growth of 30-50% per year. To cope with these demands, many companies today are building modern datacenters and investing in server virtualization, modern storage applications and cloud-based services, in pursuit of higher speeds, more efficient use of existing resources and possible cost savings.

SimpleWAN Helps SMEs Combat Security Breaches, Meet Compliance Mandates
November 6, 2015 - 1:34 PM
Thousands of small businesses are forced to shut down each year as a result of data breaches. Yet these struggling companies don't make the news, while massive breaches like those at Target, Anthem and CVS make headlines.

Business Compliance Headaches? iland Can Help
November 6, 2015 - 10:19 AM
When trying to make your business code-compliant, it can be very difficult to bring all the disparate sources within an organization together. The new holistic cloud security from iland intends to fix that. It's equipped with a unified compliance engine along with a robust security protocol to ensure its customers are abiding by the regulations that are in place.

Data Breaches Approach Coin Flip Levels
November 5, 2015 - 12:49 PM
Stories of data breaches seem to come out on a regular basis these days, from Ashley Madison to Home Depot and a host of others in between. A new study from IID conducted by the Ponemon Institute shows that this trend is on the rise, and as a result, 47 percent of companies and government organizations have been breached in the last two years.

Cisco Provides Comprehensive Visibility and Protections for Digital Ecosystems
November 4, 2015 - 10:56 AM
Having any type of digital presence requires an increased level of awareness of security threats in the ecosystem. In order to provide visibility for the entire digital environment in which organizations operate, Cisco announced improvements for its Security Everywhere platform.

What You Need to Know About the New Cybersecurity Bill
November 3, 2015 - 5:27 PM
A cybersecurity bill is making the rounds that will supposedly put measures in place to help better protect people from hackers and unscrupulous individuals. The bill, called the Cybersecurity Information Sharing Act, passed through the Senate with a 74 to 21 vote in favor. Before President Barack Obama can sign it - and make it a law - it needs to be merged with another bill passed earlier by the House of Representatives that's similar, and then the new proposition must be voted on again.

The Offsite Connection: Remote IT Support
November 3, 2015 - 3:55 PM
Resolving tickets on the helpdesk quickly and efficiently, without interrupting either the support professional or end user, is crucial to meeting service levels and maintaining a good relationship with your workforce. Remember-IT should be anytime, anywhere.

Trends and Technologies Fueling the Evolution of Middleware
November 3, 2015 - 9:47 AM
In this article, we will identify and examine several of the more prominent technologies and trends fuelling the evolution of middleware today, including cloud, DevOps, microservices, containers, and mobile.

Financial Models for Engaging a Product Development Partner
October 30, 2015 - 9:12 AM
There are many different financial models under which clients of product development consulting firms choose to engage. Start-up and early stage companies are often looking for flexibility in how they engage with a PD partner, and they often seek alternate ways to help stretch their dollars further. Even in the case of larger companies, our firm has recently started seeing non-traditional approaches to funding development. Here are some examples.

Infoblox Defends the DNS of Service Providers
October 29, 2015 - 4:02 PM
As one of the gateways for distributed denial of service (DDoS) attacks, it is extremely important to protect the Domain Name System (DNS). The new improvements Infoblox has made to its 4030 series appliance can block different types of threats to defend the DNS of service providers from possible DDoS attacks.

Consumers: The Cloud Looks Darker Than We Expected
October 29, 2015 - 2:38 PM
While there's plenty of word about the positive aspects of the cloud, there's also a growing body of concern about this radical new tech. A new study from Radware shows that, for many consumers, the cloud is looking more ominous than friendly, and some real concerns are afoot.

Actifio Copy Data Virtualization Platform Offered in Oracle Cloud Marketplace
October 29, 2015 - 2:22 PM
Oracle Cloud customers now have access to Actifio's copy data virtualization platform. The company, a platinum-level member of Oracle's Partner Network, has made the platform available in the Oracle Cloud Marketplace.

There's Always Time to KISS: Keep Intelligent Storage Simple
October 29, 2015 - 11:54 AM
If you'd walked around VMworld in San Francisco this year, you may think it ought to be renamed "VM-Storage-World". I counted 26 storage vendors offering their wares and I probably missed a few.

Balancing Security and Mobility in the Age of the Data Breach
October 28, 2015 - 2:11 PM
A Dilbert strip featuring Mordac, the Preventer of Information Services, once declared that "In a perfect world, no one would be able to use anything." How do businesses balance their security measures against employee convenience?

Find Out Who's Misbehaving to Stop Online Gaming Fraud
October 28, 2015 - 10:52 AM
While the Internet makes it easier and more convenient to place bets, it also provides the means for more organized cybercriminals to defraud these sites and their good players.

How to Hire UI Designers
October 28, 2015 - 10:18 AM
When you're not familiar with the world of digital marketing and mobile media platforms, the challenge of getting your company's name out there becomes that much more daunting. That's why one of your first steps should be to hire a professional UI designer.

Putting on the Cyber Shift: How to Adapt to Advanced Strategies on Both Sides of the Ball
October 28, 2015 - 8:36 AM
It's not a stretch to say that, like baseball, IT security is a different game than it was just a few years ago.

Cisco Beefs Security with Lancope
October 27, 2015 - 3:41 PM
Cisco has announced its intent to acquire Lancope, Inc.

Five Steps to Developing CD Pipelines
October 27, 2015 - 1:34 PM
When teams set up pipelines in continuous delivery, they all approach the challenge with the same goals. But how do they achieve those goals? What are some common pitfalls that they need to avoid?

Cybersecurity: Why CXOs Need to Play the Infinite Game
October 27, 2015 - 8:55 AM
While it might be easy for executives with non-technical backgrounds to simply assign responsibility for cybersecurity to the CSO, CISO or IT team, this would be a mistake. CXOs might see the iceberg ahead, but do they really understand the size of the problem below the surface?

Radware's DDoS Attack Mitigation System Adds New Power to SingleHop Shield
October 26, 2015 - 9:06 AM
Businesses need more ways to protect themselves online. So it should come as welcome news that SingleHop Shield has reinforced their online defense offerings with Radware's DDoS Attack Mitigation system.

Best Practices for Controlling Third-Party Access
October 23, 2015 - 8:55 AM
Who has access to your critical enterprise assets? This has become one of the most important questions in cybersecurity today. Learn how to control that access with SSH Communications Security's Matthew McKenna.

Migrating to the Cloud to Advance the Continuous Improvement Process
October 23, 2015 - 8:40 AM
As individuals and leaders, we have the potential (even the obligation) to be the spark within our organizations to create change and make a difference. However, the larger question is often where and how do we get started?

Transera's Call Center App Necessary for North Texas Specialty Physicians
October 22, 2015 - 11:40 AM
With healthcare costs rising across the board, and ways to reduce those costs high in many minds, the thought of putting the cloud contact center to use is gaining plenty of traction with firms. Transera recently announced that North Texas Specialty Physicians (NTSP) was looking to go that route, bringing in the Call Center App for Salesforce as a way to help drive service and possibly lower costs with it.

Adaptiva Releases Version 5.5 of OneSite with Upgrades to SCCM Enterprise
October 22, 2015 - 11:33 AM
Microsoft's System Center Configuration Manager (SCCM) can now manage large groups of computers running a wide range of operating systems. The new upgrades on the Adaptiva OneSite 5.5 will introduce more functionality to SCCM with greater visibility, transparency, control, scalability and automation.

Study: Enterprise Applications Face Major Security Lapses
October 22, 2015 - 11:13 AM
The security threat landscape in the connected world is getting more dangerous for consumers and enterprises alike. An independent study conducted by King Research revealed 60 percent of organizations don't require non-employee multifactor authentication to access enterprise applications.

Wheelings & Dealings: Western Digital Makes $19 Billion Move on SanDisk
October 22, 2015 - 8:06 AM
Western Digital has agreed to buy SanDisk in a $19 billion deal that will give Western Digital lots of leverage in storage, particularly in the growing flash storage market.

Trend Micro to Buy HP TippingPoint in $300 Million Deal
October 21, 2015 - 6:15 PM
Security software powerhouse Trend Micro International is expanding its range of offerings and eliminating a key competitor with the acquisition of HP TippingPoint. The company announced a definitive agreement to purchase the HP company, which specializes in next-gen intrusion prevention systems (NGIPS) and network security, for $300 million.

Security Awareness for Managers: Protecting Yourself and Your Company
October 21, 2015 - 10:04 AM
Nowadays, security awareness training (SAT) is a top priority for organizations of any sizes. Learn how to guard and educate your personnel with writer Daniel Brecht

Report Shows Consumers Want Businesses to Increase Online Security
October 20, 2015 - 3:56 PM
A recent study shows that customers are extremely interested in what retailers are doing in order to protect their financial information. The report, issued by the American Banker's Association (ABA) found that an overwhelming majority of people think retailers should be going the extra mile to protect consumer data from hackers.

New Research Shows Enterprises Falling Short on Data Control
October 20, 2015 - 10:33 AM
Big data and virtualization technologies continue to grow exponentially as companies scramble to implement cost effective and efficient ways to deal with increasing amounts of data. That trend was reflected in recent research from IDC, as commissioned by copy data virtualization specialist Actifio.

Verizon Expanding Secure Cloud Service into Latin America
October 20, 2015 - 9:51 AM
Verizon's secure cloud solution has been growing by leaps and bounds over the last few months. Now the company says that it is going to be expanding the service and deepening its global footprint with an expansion into Latin America.

Verismic Offers Power Manager to Help the Environment
October 19, 2015 - 1:57 PM
One of the primary benefits of CMS is its cloud-based nature. By working entirely in remote servers, clients can avoid conflicts with their own software and hardware they use or any third-party programs they may utilize on a daily basis. Clients can use any Web browser to enter the CMS interface and gain a complete look at their entire IT systems and associated energy usage.

Verizon Enterprise Solutions Expands Availability of SDN Service
October 19, 2015 - 12:05 PM
Verizon Enterprise Solutions, a division of Verizon that offers software-defined networking (SDN) to businesses, recently announced the expansion of its services for greater public sector availability.

Centrify Becomes Newest Member of Cloud Security Alliance
October 19, 2015 - 9:19 AM
Centrify, the developer of identify theft protection software Centrify Identity Platform, recently announced that it has become the CSA's newest member. That security platform helps secure enterprise data by scanning on-premise, cloud-based, and mobile applications and networks for signs of a breach. It authenticates users through a single sign-on, multi-factor process in order to vet all users and actions that could take place on any network.

In Cybersecurity, 'Whodunit?' is Much Less Important Than 'What Do We Do Now?'
October 16, 2015 - 10:23 AM
There are more important questions than "whodunit" when it comes to network breaches and data theft.

To UTM Tag or Not UTM Tag, That is The Question
October 16, 2015 - 9:57 AM
Even in the analytics industry, there is very little discussion or understanding around why or how UTM tagged links influence data in Analytics, which is unfortunate because UTM tags have a significant influence on the two most essential variables for every pageview: source and medium.

Site Selections Group on Market Trends, Tax Incentives
October 15, 2015 - 3:48 PM
Recently, TMC's CEO Rich Tehrani had the opportunity in Dallas, TX to interview King White, CEO of Site Selection Group. Check out the interview here.

IT Budget Challenges in the United States Worst on the Planet
October 15, 2015 - 10:45 AM
On a certain level, it's not a surprise that the United States would have some serious difficulties when it comes to information technology (IT) budgets. It's home of some of the largest corporations on Earth, and a host of small businesses that all face cybersecurity challenges in a rapidly changing environment. But the new report from Axios Systems suggests that the budgets to meet those challenges won't be growing much in the United States as compared to the rest of the world.

Dell, HP, Intel, Lenovo and Microsoft Launch Campaign to Boost PCs
October 15, 2015 - 8:37 AM
The giants of the computer world are launching a marketing campaign to highlight why PCs are still relevant.

Dear Fingerprint Scanner, We Could Be Really Great Together
October 14, 2015 - 3:00 PM
Even if humans made more complex passwords, even if websites stopped storing us in plain text, and even if encryption became widespread, we'd still be in trouble. The truth is, Fingerprint Scanner, you are one sexy animal analyzer. For most of those humans, pressing a thumb on you is the closest they will ever get to being a secret agent.

Beyond Hybrid: Four Steps to an Intelligent Business Cloud
October 13, 2015 - 8:08 AM
Special guest writer Marshall Wells of Accenture outlines his vision of an "Intelligent Business Cloud" and lays out four steps to get there.

7 Signs SMBs Have Outgrown Their Software Solutions
October 12, 2015 - 10:52 AM
How do SMB's identify when they've outgrown their software solution? Breakthrough Technology's Doug Wilson identifies seven red flags to look out for.

5 Security Issues CIOs Must Consider Before Implementing New Technology
October 12, 2015 - 8:37 AM
Pypestream CEO Richard Smullen outlines the five most important security concerns CIOs must address before making significant technological changes.

Preparing for a Load Test: The Vital Points You May Be Overlooking
October 9, 2015 - 11:25 AM
BlazeMeter's Refael Botbol breaks down the proper preparation for a load test.

DevOps Early Adopters Say Open Source and PaaS are Key
October 8, 2015 - 11:34 AM
With DevOps approaches being used to create and run software across an increasingly broad spectrum of organizations, we're now at the point where we can gain quantitative insights from early adopters about DevOps adoption that go beyond a handful of oft-referenced Web-scale anecdotes.

ITEXPO 2015 Day Three: The Impact of Digital Freedom on Security
October 7, 2015 - 4:22 PM
Day three of ITEXPO 2015 started off on a powerful note as Candace Worley, Senior Vice President & General Manager, Endpoint Security of Intel Security delivered an impactful keynote on the reality of modern corporate security.

Skyworks Acquires PMC Sierra in $2 Billion Deal
October 7, 2015 - 3:12 PM
Skyworks announced recently that it would purchase PMC Sierra in a deal totaling $2 billion. The transaction allows Skyworks to diversify its customer base as the semiconductor industry grows more competitive.

Anaheim ITEXPO 2015 Casts a Spotlight on Legal Issues in Cybersecurity
October 7, 2015 - 2:20 PM
Rajeev Sachdev, a professor, researcher and lawyer based in the state of California, explains how cybersecurity, although a highly discussed topic, leaves much left to be understood-especially when it comes to legal obligations and considerations.

Big Brands Realize the Importance of Updated Content Delivery Networks
October 7, 2015 - 12:22 PM
Google and Alcatel-Lucent recently upgraded their content delivery networks (CDNs), demonstrating the increasing reliance on CDNs in the business world.

TechnologyAdvice Offers Tech Insight Ahead of ITEXPO
October 6, 2015 - 4:55 PM
TechnologyAdvice, a popular b2b technology research/review service, provides intel on a wildly diverse set of industries. While our readers will doubtlessly appreciate their VoIP, Cloud Storage, and CRM knowledge, the company also reviews gamification, HR, accounting, and project management software (among others).

Best Practices for Building Trust in Cyberspace
October 6, 2015 - 8:48 AM
In an increasingly hostile and volatile cyber landscape, trust is a vital yet sometimes elusive component of business. Establishing trust is easier said than done, and it's not getting any easier. Guest writer John Grimm, Senior Director at Thales e-Security, explains the best ways to build consumer trust in the digital marketplace.

Why Data Center 'Availability' is here to Stay
October 5, 2015 - 4:20 PM
Guest writer and Veeam Regional Director of Middle East and SAARC Gregg Petersen draws a road map to the 'Always-On' data center.

GTISC: Cybersecurity Top Priority for Growing Number of Firms
October 5, 2015 - 1:55 PM
These days, it seems like cybersecurity is front and center for a lot of people. A new study from the Georgia Tech Information Security Center (GTISC) reveals that it doesn't just seem that way to the outside viewer: cybersecurity really is a big concern for many out there.

Are You Measuring IT & PMO Business Value All Wrong? 3 Ways to Get it Right
October 5, 2015 - 9:25 AM
Here are three ways your organization can shift the way you're measuring the value you add to your business (or start documenting that value) as well as close the gap between the business and technology groups in your organization.

Six Things Your IT Support Might Be Missing
October 5, 2015 - 9:11 AM
Do you know what your IT initiatives are or what your IT support is working on? If you know the answer, great! You are among the few business owners who do. If you are not, here are six talking points to discuss with your IT support and how they can help your business.

AppliedMicro, Vapor IO Get Together For Telemetry Advancements
October 1, 2015 - 5:37 PM
Data centers are not easy things to manage. With an ever-increasing amount of data flowing through the system, which in turn needs to be regulated to make sure it all gets where it's going without an unnecessary bottleneck or the like. Certain tools, meanwhile, can make this process easier-though never really easy-to handle, and one such advance recently came out as a result of a new partnership between AppliedMicro Circuits Corporation and Vapor IO.

2015 infoTECH Spotlight Data Center Excellence Award Application Now Open
October 1, 2015 - 3:44 PM
- TMC, a global, integrated media company helping clients build communities in print, in person and online, announced today that applications are now being accepted for the 2015 Data Center Excellence Award, presented by infoTECH Spotlight.

The xPaaS Revolution and the Rise of BizDevOps
September 29, 2015 - 5:25 PM
Platform-as-a-service, or PaaS, is an increasingly popular cloud offering that enables developers and IT operations professionals to build and maintain applications while avoiding many infrastructure-related challenges and expenses. According to a 2014 IDC report, the global PaaS market is expected to reach $20.3 billion in 2018 as enterprises continue to adopt this new technology.

Mind the Gap: Eluding the ITSM Slippery Slope
September 29, 2015 - 5:11 PM
Administering ITSM comes with some slippery rabbit holes, and is much like the famous Alice in Wonderland quote: "If you don't know where you are going any road can take you there." We've heard a lot about the gaps between ITAM (IT Asset Management) and ITSM (IT Service Management), the gaps between ITIL and ITSM, and more recently the gaps between ITSM and ITSSM, and even the more nuanced maturation levels of your ITSM. Without timely and relevant data, your processes, people, governance, and your entire IT vision all become manipulated and bent in imprecise manners, yielding your ITSM ineffectual.

RiT's IT Infrastructure Management Software Brings Global Investment Bank Agile Data Centers
September 29, 2015 - 4:25 PM
RiT Technologies, a provider of converged IT infrastructure management and connectivity solutions, recently announced that an unnamed global investment company has deployed CenterMind, RiT's acclaimed IT infrastructure management software offering.

MASS COMMUNICATIONS Serves at ICR Network Operations Center
September 29, 2015 - 2:24 PM
Connectivity and telecom management provider MASS Communications has announced that it is deepening its relationship with ICR, acting as its network operations center (NOC).

the xPaaS Revolution and the Rise of BizDevOps
September 29, 2015 - 10:32 AM
Platform-as-a-service, or PaaS, is an increasingly popular cloud offering that enables developers and IT operations professionals to build and maintain applications while avoiding many infrastructure-related challenges and expenses. According to a 2014 IDC report, the global PaaS market is expected to reach $20.3 billion in 2018 as enterprises continue to adopt this new technology.

Keep it Simple: Why Simplicity Leads to Enterprise Success
September 29, 2015 - 9:19 AM
The modern workplace - specifically the enterprise - can be stressful. Overflowing email inboxes, numerous tasks and projects with tight deadlines, and too many enterprise systems with too many buttons and too many features. As if that weren't enough, complex business processes also exist with multiple stakeholders that need to be managed. The information systems that once promised to help us soon became so complicated that nobody knows how to use them properly. The enterprise reality is that employees spend too much time organizing their work and trying to simplify so they can understand what they need to do, how to do it and when to do it instead of doing actual work.

Vorex and Continuum Introduce New RMM-PSA Integration
September 28, 2015 - 1:43 PM
The latest productivity-enhancing solution is an integration of Vorex's professional services automation (PSA) tools and Continuum's remote monitoring and management (RMM) platform.

How VPS Hosting is a Cheap Alternative for Enterprise
September 24, 2015 - 11:13 AM
Since the origin of online business management, people have been comparing different resources of data management and security. There have been debates about using Virtual Private Server and how it serves better or lesser than other web hosting services. The cheapest VPS services are available from $18 but if you want better and more professional services, then you need to take out a few hundred dollars from your wallet only. But does that make VPS an economic solution for your online business?

Data Virtualization Provides a Common Fabric to Enable Agility and Deep Business Insights
September 23, 2015 - 12:26 PM
When examining the overall data architecture of any organization, agility is absolutely essential to ensure all layers are mined in a logical and useful way. Data virtualization can go a long way toward achieving this, bringing together information from disparate tools into an agile and flexible common fabric.

Design for Manufacturing (DFM) Thinking in Advanced Development: Inject DFM Early and Often
September 22, 2015 - 10:52 AM
Advanced Development (AD) is the "sandbox" between classical research and development (R&D) and Product Development (PD). Living in this grey zone, engineers in AD are typically in a role where they mitigate risk on technology being released from an R&D environment. Why this intermediate AD activity? The output from research teams still needs a good bit of work to prove its readiness for a production-ready development effort. When teams are on a product development track, the cost of failure is high.


Subscribe to InfoTECH Spotlight eNews

InfoTECH Spotlight eNews delivers the latest news impacting technology in the IT industry each week. Sign up to receive FREE breaking news today!
FREE eNewsletter