Enabling Collaborative IT With Converged Infrastructure
Changing the culture inside an IT organization is one of those chicken-and-egg propositions. It’s difficult to figure out if the culture should change before acquiring new technology that better fits...
View ArticleAre you a IT Service fast food junkie?
Ask any doctor and they will tell you that one of the biggest challenges we face as a society is our love of fast food. We want what we want and want it now. Funny thing is, if you asked that same...
View ArticleRSA NetWitness Suite: Changing the Security Paradigm
In technology – especially information security – the pace of change can be overwhelming. Adversaries continually invent new (and more often, reinvent old) ways to infiltrate and compromise...
View ArticleStorage Media Transformation
2016 is the Year of Flash storage for transactional processing. The transition to flash has been journey for the industry. EMC introduced flash storage media and Fully Automated Storage Tiering...
View ArticleAccount Takeover Gains Full Visibility with Web Behavior Analytics
Interest in and adoption of web behavior analytics is surging because of its ability to interpret the navigation and intent of each visitor to the website and as one of the best ways to protect the...
View ArticleEMC Online Support and MyService360™ Updates
Delivering Even More Insight for Faster Action Since the launch of MyService360 at EMC World 2016, and the coinciding interface redesign of EMC Online Support, EMC Global Services has continued to...
View ArticleSharing Experiences in the Energy Industry
Over the past couple of months, we have had some great opportunities to bring our customers together and share experiences. Talking with customers, hearing about their challenges, and working to...
View ArticleTales from the Black Hat NOC: I’ll Show You Mine, We Can Already See Yours
With the start of Black Hat 2016 merely a day away, white, black, and grey hats from around the world are whetting their appetites – eagerly waiting to show off and consume the fruit of an entire...
View ArticleTales From The Black Hat NOC: Organizing the Chaos
A glimpse into training day. Yesterday marked the official start of Black Hat 2016, kicked off with various training courses spread throughout the convention center. For the RSA NOC team this meant a...
View ArticleTales From The Black Hat NOC: Data in the Clear
I started my day by reading an article about how to stay safe during Black Hat and DEF CON. There were suggestions such as not bringing a laptop to the conference, not bringing your...
View ArticleAvoiding Pitfalls in your SQL Server Migration
Recently, most of my blog entries have been about SQL Server migrations. With extended support for Microsoft SQL Server 2005 having ended in April, it’s a timely discussion. In this blog, I’d like to...
View ArticleScaleIO the best multi-platform transactional SDS?
From where I sit, the storage market transition is in full swing. The era (1990-2015) where the world of “persistence” was dominated by “external” storage (aka “arrays”) is shifting to one where...
View ArticleTales from the Black Hat NOC: Attendee Attacks, Loud and Proud
We are approaching the end of Black Hat‘s training days. It’s an interesting time when the expo floor still sits quiet, but the Black Hat network is as noisy as ever – as seen by the RSA volunteers...
View ArticleBig Data Dilemma: Save Me Money Versus Make Me Money
My friend Dan sent me this press release (since he knows that I like all things “Data Analytics” related). In the press release, “Boeing Announces Data Analytics Agreements with Six Airlines,” Boeing...
View ArticleTALES FROM THE BLACK HAT NOC: WHAT’S IN YOUR CLASSROOM?
Hanging in the NOC these last couple of days has confirmed one thing. Creation of content to support an information security program is an ongoing process. It starts with the identification and...
View ArticleAre Legacy Apps Slowing IT Transformation?
Sometimes it really does help to talk things over. Reflecting on my recent interview on The Cube with John Furrier, Co-CEO SiliconANGLE Media and Dave Vellante, Founder of Wikibon, I’ve been able to...
View ArticleBuilding the Modern Data Center on a Foundation of Trust
If your organization is struggling with how to keep your enterprise data secure in the cloud, you aren’t alone. The fact is, the modern data center poses some fairly new security challenges and there...
View ArticleTales From The Black Hat NOC: Chaos So Organized, Even a T-Rex Can Do It
By Wednesday morning at Black Hat, the traffic profile switched from compartmentalized, per-classroom monitoring to a more distributed and chaotic sea of general conference wireless. This meant a...
View Article[LIVE WEBINAR – ASIA PACIFIC] How to Protect Against Cyber Attacks and...
Webinar Name: How to Protect Against Cyber Attacks and Ransomware Date and Time: Wednesday, 10 August 2016 Duration: 45 Minutes The very nature of security attacks and the methodologies to detect and...
View ArticleHyper-Convergence it aint a passing fad.
Hyper-Converged Infrastructure (HCI) is all about getting “out of the infrastructure business”, and focus on the business – just like Converged Infrastructure (CI). But, HCI is different from CI in...
View Article