Bring-Your-Own-Identity Gains Steam in Information Security
Bring-your-own-identity (BYOI, or sometimes BYOID) is an emerging concept in Identity and Access Management. BYOI has become interesting because it presents a realistic solution to a pressing problem:...
View ArticleThe Great Skills Exodus: Why the industry’s leading IT talent is deserting...
Foreword Today’s organisations will succeed based on their ability to move and respond at speed, excite their customers, differentiate their businesses and safeguard their brands. These commercial...
View ArticleAppetite and Exercise
In my last blog post, I posed the concept of Cyber Risk Appetite as something that all organizations need to consider today. I used the analogy of a balanced diet of risk – taking some risks to keep...
View ArticleAchieving Public Cloud Agility with the Comfort of Private Cloud Resiliency...
Change is a constant and it is inevitable. This has never been more accurate than today with the movement towards the modern data center. The modern data center allows you to deploy architecture that...
View ArticleEMC MOBILE: Your Companion for Technology Insight and Product Support
Your EMC MOBILE Companion Just in time for #EMCWorld, the EMC MOBILE app for iOS and Android will be releasing a new and improved version on May 1st. A favorite among EMC customers, the EMC MOBILE app...
View ArticleGood Insight from Gartner on How to Do SIEM Right: Part 1
In a recently released report from Gartner titled, SIEM Technology, Market and Vendor Assessment, (Gartner.com client access needed to get the full report), Gartner analysts Anton Chuvakin and Augusto...
View ArticleAre Life Sciences Organizations Ready for Business Transformation? The...
The pressure is on for Life Sciences organizations to transform by accelerating time to market and improving efficiencies enterprise-wide. The word from the executive suite: reduce operational...
View ArticleMoving Beyond the Frontier with Cloud Flexibility
In just a few short years since we introduced our cloud solutions for content management, we have swiftly moved beyond traditional IT to prepare for the mobile and social world. Looking across our...
View ArticleWhy a Data Lake? Keeping Up with the Digital Universe
With the digital universe expected to swell to 44 zettabytes of data by 2020, today’s enterprises need a central data repository that can process increasing volumes of all types of data faster to let...
View ArticleAssisting the Blind is CrawfordTech’s Unique Vision
“Having equal and timely access to transactional customer communications is absolutely critical for both blind and sighted individuals.” – Ernie Crawford, President & Founder, Crawford...
View ArticleCapturing “Awesome” Customer Experiences in Real Time
Do you remember the last time you had an interaction with a financial institution and thought, afterward, “Wow, that was a great customer experience!”? Yeah, not so much. Financial processes are...
View ArticleMoney Mules: The Critical Cash Out Service in the Fraud Supply Chain
While we might associate a mule with the stubborn, four-legged animal, in the world of cybercrime, it has a much different connotation. Mules can come in the forms of both accounts or people and are...
View ArticleGoing the Distance for Data Protection
Today marks an important day in Boston, MA; the 120th anniversary of the historic Boston Marathon. 20 EMCers from across the globe, including myself, represent Team EMC and will be taking our place...
View ArticleEMC and PAREXEL: On the RIM of Innovation
Last week, we announced an alliance with PAREXEL to deliver a cloud-based, end-to-end Regulatory Information Management (RIM) solution. I want to share this exiting news and provide my perspective on...
View ArticleHow Breach Readiness Is Enhanced by Threat Intelligence
Breach readiness is essential to limiting the impact of data breaches, regardless of industry or company size. Recent RSA research determined the current state of breach readiness and response at...
View ArticleDeciphering the Debate Over Encryption
Today, I testified before the United States House of Representatives Energy and Commerce Subcommittee on Oversight and Investigations hearing entitled “Deciphering the Debate Over Encryption: Industry...
View ArticleWhy Is Proving and Scaling DevOps So Hard?
My team and I regularly meet with customers who ask the same question over and over, “how do we become successful with DevOps-at-scale?” This question is normally followed with a laundry list of...
View ArticleCloud Considerations for Application Modernization
Over the last several years we’ve all witnessed the disruptive nature of software. Startups have emerged that have transformed traditional markets – Tesla, Uber, AirBNB. We’ve also seen existing...
View ArticleWhat’s The Big Deal With Big Data?
Big Data is a Big Deal because, if channeled appropriately, you can put power back into the hands of your customers. And this can often be accomplished using the very same data you’ve had all along....
View Article