Opening your EMC Isilon Service Request: What does Support want to know?
Hello again Support Community! Katie, Shane, and Dave here with some tips, tricks, and gotchas for opening an SR with Support and moving your issue to resolution quickly and accurately. First off,...
View ArticleA Big Leap In Unstructured Data Isilon.Next - Core, to Edge, to Cloud
Do you have an Xbox – 360 or XboxOne? Do you use XboxLive? I do – and as an aside, I’m looking forward to a little Rise of Tomb Raider this weekend, along with Fallout 4 until my eyes bleed :-) If...
View ArticleReducing Fraudulent Transactions during the Holiday Shopping Season with...
While it may seem a bit early to be addressing the holiday shopping season, the giant nutcrackers are already towering over the pumpkins at the mall so I figured it was fair game. So what can we...
View ArticleBuy My Cloud: On-Boarding Customers to Cloud Offerings, Part 1
Dave Shepherd So you’ve got your nice new cloud offering, in fact you’ve probably got more cloud offerings than you ever thought possible. What, with secure versions, multi-tenant, single-tenant,...
View Article3 Actions You Can Take to Positively Impact Your Customers’ IT Organizations
I think most of us try to make a difference in our customers’ businesses. And, when we understand our customers’ pain points, we are better able to provide solutions that address their needs and...
View ArticleBig Data Insights in Healthcare, Part III: Mitigating Challenges to Adoption...
Louis Frolio In 1776, Adam Smith published, “An Inquiry into the Nature and Causes of the Wealth of the Nations” in which he introduced the “invisible hand” concept. Simply stated, Smith believed if...
View ArticleEmpower IT to Say Yes More Than No
Pity the poor (IAM) administrator in IT. They often have to juggle the needs of multiple constituents and weigh the conflicting demands of users and their network security counterparts. As users...
View ArticleReconstituting Our Software Development Skillset
The digital transformation of our economy is creating many challenges for CIOs and IT organizations. The development of original software at scale is near the top of that list. Over the last 15 years,...
View ArticleWhat Would You Call the Market for Today’s Threat Detection and Response...
What would you call the market for security monitoring solutions that help organizations better detect investigate, and respond to advanced security threats? Five or ten years ago you could certainly...
View ArticleViolinists to Biometrics – RSA Charge Outtakes
Actionable intelligence, anomalous patterns, 3rd platform transformation, readied response, mobile proliferation – just some of the thematic vernacular that characterized the hundreds of...
View ArticleHow to Build a Culture of Innovation: Part 1 – People
Jenny Beazley Technology is transforming the way we do business and the rate of change is accelerating—it took only a few years for half of the U.S. population to adopt smart phones versus nearly 50...
View ArticleThoughts on the Plane from the Cyber Education Conference- and Feeling Energized
I’m fresh off the National Institute for Cyber Education (NICE) Conference 2015, the premier gathering for academics, government and industry to advance cyber education. The mission of the conference...
View ArticleIt’s Time to Bridge the Identity Infrastructure Chasm
In a previous blog I discussed the importance of not carving a chasm into your identity infrastructure by using different systems for on-premise and cloud-based applications. I’ll continue with that...
View Article2016 Predictions: Content Gets “Smarter”– Part 1
We live in very exciting times. The world is going digital and digital transformation is at the top of every CEO’s agenda. Perhaps not since the advent of the Internet has technology played such a...
View ArticleThe Paperless Personnel Proposition
Government Human Resources departments are often called Departments of Personnel. These departments manage all the information about the employees of the federal, state or local government entity....
View ArticleMore Than Meets The Eye (Part 2): Solving the Browser Lock Ransom Page
In the original More than Meets the Eye blog, we discussed attackers’ ability to hide in plain sight. A very successful campaign that utilizes this approach is the fake FBI ransom webpage; a...
View ArticleThe Cloud: Spot The Difference
Cloud storage is a bit like air travel. When flight was new, it made new things possible – distant holidays, global business, year-round seasonal produce. But it hasn’t replaced every other form...
View ArticleE3 – Hordes at the Gate – The Aftermath
Marty walked into the conference room and immediately sensed the buzz and tension. He knew the debrief of the denial of service attack was going to be a long one but he didn’t anticipate this much...
View ArticleIntroducing RSA Archer GRC 6 to Our Federal Community
Through the years, as federal information assurance professionals, we’ve seen a lot of adjustments and evolution. We had an arms race in buying newer and better firewalls, more secure networking...
View ArticleSpanning Backup for Office 365 Extends Data Protection to Calendars
We are happy to announce that Spanning Backup for Office 365 now protects Calendars in Exchange Online. With today’s announcement , Spanning now provides automated and on-demand backup along with...
View Article