How to Tailor a Continuous Monitoring Policy to Focus on Critical Assets
Many organizations want to implement a continuous monitoring policy, which combines processes and technology to ensure security systems are working efficiently and effectively. Continuous monitoring...
View ArticleIT Execs Plan to Reduce Software Development Release Cycle Times by 75-90%
Part 5 in our global study of gaps in IT transformation In our State of IT Transformation analysis, nearly 70% of participants said that they take at least 6-12 months, and often more, to get a...
View ArticleUnlock Customer Intimacy Through Big Data
What does it take to thrive in a world where customers demand an experience that is highly personalized and relevant? We believe the key is in understanding customer needs and unlocking customer...
View ArticleA Three Pronged Approach to Achieving Customer Intimacy through Big Data
Big Data capabilities are not on the horizon and only the subject of talk. It is definitely real and its impact can be seen across consumer and business-to-business markets. For some companies, Big...
View ArticleThe Ultimate Purpose of Big Data: Customer Intimacy
Activity Needs Purpose While on a walk in the countryside, a man came upon a huge construction site and he asked a number of people what they were doing. The first looked up and said with a sigh, “I’m...
View ArticleWhat It Takes To Deliver A Personalized Customer Experience
Customer expectations drive business. Companies that succeed are great at meeting those expectations. Companies that excel are great at changing them. Customers didn’t expect a cell phone to play...
View ArticleHow to Unlock Customer Intimacy
Imagine a world where every interaction you have with a company, either as a consumer or a B2B buyer, is personalized. And now imagine that these companies are able to predict your level of...
View ArticleWhat Keeps You Up at Night?
The 2016 U.S. election? Tom Brady’s suspension reinstatement? If you’re my son’s 4th grade teachers, the words “standardized testing” may warrant some unrest. I’m always amused by their heightened...
View ArticleTaking a Moment to Celebrate Success
Typically, I enjoy sharing my thoughts on the trends in the ECM and technology industries, the challenges our customers are overcoming, and how we’re working with our partner ecosystem to address...
View ArticleAn Insider’s View of SQL Server Migrations
In my last blog, I talked about the top 5 reasons to migrate from Microsoft SQL Server 2005. And I promised, as a follow up, to give you an insider’s look at how EMC approaches Microsoft SQL Server...
View ArticleNew PCI Multifactor Authentication Rules: Is it Too Late?
The PCI Security Council just extended its requirements for multi-factor authentication to anyone who has access to credit card data. These requirements, which comes on the heels of the European...
View ArticleStrata+Hadoop London 2016
London here we come… starting June 1 through June 3, we will be at the SOLD OUT Strata+Hadoop World at ExCel London. We will be in stand #408 over the three days and on Tuesday, June 2 at 1455,...
View ArticleHow to Win as a Technology Mixologist
Did you ever notice that winners always want to win, no matter what their field or activity? This makes it easy to find inspiration for using technology to your advantage, even in the most unlikely of...
View ArticleMonitoring Assets and Vulnerabilities: Matching Data With Action
Monitoring assets and vulnerabilities has become a high-priority security practice for many enterprises. As RSA President Amit Yoran said in his RSA Conference 2016 keynote, the inevitability of an...
View ArticleSecurity at Scale: Making Security Analytics Work for the Internet of Things
This year more than 10 billion devices will connect to networks around the world. And in the next few years, that number will increase by over an order of magnitude. With the veritable explosion of...
View ArticleBig Data Business Model Maturity Index and the Internet of Things (IoT)
Antonio Figueiredo (@afigueiredo) recently challenged me on twitter with an interesting question: How would the Big Data Business Model Maturity Index (BDBMMI) change to support the Internet of Things...
View ArticleMaking Deployment Decisions in the Energy Industry
Over the past few years, CIOs and many analysts have been predicting and observing a major trend in IT: the move to the 3rd Platform. This trend is being driven by innovation from software vendors, as...
View ArticleDigital Transformation: What does it actually mean?
Digital Transformation has been the phrase on every CEO, CIO and IT manager’s agenda for the past few years. Just a quick Google search today illustrates the level of conversation and debate around...
View ArticleAdvanced Detection Methods: Tips for Detecting Potential Insider Threat
In the new era of information security, traditional controls designed to deter attackers and protect assets are being augmented by advanced detection methods and new capabilities for response and...
View ArticleTechnology Foundation for the Modern Data Center
As we know, the digital universe is growing 40% every year – which means the volume of data agencies collect, store, and manage will only continue to grow. Between all the video captured via body-worn...
View Article