Quantcast
Channel: Blog | Dell
Browsing all 8970 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Momentum Barcelona Registration is OPEN!

It’s been 4 years in the making. The moment you’ve waited for is finally here. Momentum Barcelona registration is OPEN! This Autumn Momentum Europe returns to the city where we had one of our most...

View Article


Image may be NSFW.
Clik here to view.

RSA Named A Leader in Gartner Magic Quadrant for IT Risk Management

RSA Archer is very excited to be recognized by Gartner once again as a Leader in the 2016 Magic Quadrant for IT Risk Management! Of the nearly dozen vendors evaluated, RSA was cited as the vendor with...

View Article


Image may be NSFW.
Clik here to view.

Driving Quick Transformation Wins with Application Retirement

Enabling the business to more effectively respond to industry disruption has undoubtedly been the biggest driver of application transformation over the past several years. But as we recently noted,...

View Article

Image may be NSFW.
Clik here to view.

Lessons In Open Source

Three years ago, the thought of EMC offering up code to open source projects for the world to freely access would have been heresy. The old idea was that we’d produce proprietary source code and over...

View Article

Image may be NSFW.
Clik here to view.

Embrace the Digital Economy with Open Arms

Have we all become so impatient? In a world where increasing information and services are available at your fingertips or, in some cases, at the command of your voice, it’s no wonder that we have come...

View Article


Image may be NSFW.
Clik here to view.

Blog Series: Business Resiliency Maturity Model

We believe organizations today face more risks and changes than they are positioned to keep up with.  Business Continuity Management (BCM) or Business Resiliency (BR) programs are no different. These...

View Article

Image may be NSFW.
Clik here to view.

Behind the Glass Walls of the Black Hat NOC 2016: RSA Takes the Challenge

Every year, the increased sophistication of threat actors and the expanding attack surface makes it more challenging for the Black Hat NOC security teams to maintain a highly functional environment...

View Article

Image may be NSFW.
Clik here to view.

How Mobile Phones are Eliminating the Need for Scanners

Has this happened to you? My son forgets a workbook at school and we have to find a classmate to get the exercises for homework. The other parent (or child) quickly snaps a full-page photo of the...

View Article


Image may be NSFW.
Clik here to view.

Why Isolated Recovery Solutions Can Help Thwart Your Next Cyber Attack

The cyber security threats facing organizations are more numerous and dangerous than ever. Ever day, hackers find new ways to exploit your infrastructure and wreak unprecedented havoc. The hacker’s...

View Article


Image may be NSFW.
Clik here to view.

Global Services Tech Talk: Intelligent Data Mobility (Faster, Cheaper,...

Traditional data migration is disruptive, expensive, and time-consuming. And worse, it has always been a speed bump to you realizing the value of new storage infrastructure. With the pace of change...

View Article

Image may be NSFW.
Clik here to view.

Well done to EMC Ireland Junior Achievement Volunteers #EMCGivesBack

EMC Ireland COE held a Junior Achievement Recognition Ceremony for its volunteers on 28th June 2016. EMC was delighted to welcome Liz McEvoy, Cork Area Manager, JAI, and Siobhain O'Hea, Programme...

View Article

Image may be NSFW.
Clik here to view.

Identifying Fraud Faster with Intelligence Feeds – Web Threat Detection v6

Online fraud remains as much a part of digital life as URLs. Fraudsters are constantly devising new ways to separate consumers from their money, login credentials, Personally Identifiable Information...

View Article

Image may be NSFW.
Clik here to view.

Great Things Come in 3s – EMC (RSA) Positioned in Leader’s Quadrant in Three...

We have all heard the adage that great things come in threes. Stooges. Pigs. Blind Mice. The list goes on and on. I have am very pleased to announce another thrilling combination of three – Gartner...

View Article


Image may be NSFW.
Clik here to view.

Great Things Come in 3s – EMC (RSA) Positioned in Leader’s Quadrant in Three...

We have all heard the adage that great things come in threes. Stooges. Pigs. Blind Mice. The list goes on and on. I have am very pleased to announce another thrilling combination of three – Gartner...

View Article

Image may be NSFW.
Clik here to view.

Third Party Governance and RSA Archer 6.1

In my last blog I discussed the benefits of the of new RSA Archer 6.1 release, aligning an organization’s Operational Risk Management program maturity with the RSA Archer technology to support it....

View Article


Image may be NSFW.
Clik here to view.

The challenges facing healthcare’s digital future

I recently attended the UK HIMSS Executive Leadership Conference, where this year’s focus was on building apps and solutions on top of Electronic Patient Records (EPRs). However, from my discussions...

View Article

Image may be NSFW.
Clik here to view.

GDPR Post Brexit – Are You Getting Ready?

The European General Data Protection Regulation presents the most significant change to data protection in the UK and EU since 1995.  It’s been discussed in the EU for the last four years so...

View Article


Image may be NSFW.
Clik here to view.

How Universities Can Help Build Job-Ready Graduates That Possess IT...

In recent years we have seen a heightened appreciation of investment in STEM (science, technology, engineering, and mathematics) disciplines as a vehicle that can boost innovation. There has been a...

View Article

Image may be NSFW.
Clik here to view.

Big Data Success: Prioritize “Important” Over “Urgent”

Ugh. I see so many organizations get so close to the goal line with Big Data, and then get sidelined by something that is not nearly as important to the business. It is easy to see how these...

View Article

Image may be NSFW.
Clik here to view.

Enter at Your Own Risk: The Perils of Livestreaming Content

There’s no such thing as a free lunch, not even on the Internet. But if you do decide to splurge, new research finds your lack of willpower may come with a side order of malware. In this case, that...

View Article
Browsing all 8970 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>