The RSA Archer Navigator Tool – Coming October 25th
We want to help you be successful, whether you are fighting the latest security threat or mitigating business risk. Our industry-leading products help you fight those battles, but we know that buying...
View ArticleNew Research Reveals: Phishers Launch a New Attack Every 30 Seconds
As long as users can be fooled, phishing will continue to proliferate. In fact, many major breaches start as a targeted phishing email. According to the latest statistics from RSA FraudAction...
View ArticleA Message To Customers: CX Day 2016
At Dell Technologies, we have an unwavering focus on putting our customers first. The reality is that you—our customers—have always been the driving force behind everything we do. Our leadership team...
View ArticleHybrid Cloud: What The CFO Wants To Know
Operating a modern business requires IT organizations to reexamine their infrastructure. No longer can traditional monolithic systems provide the speed, flexibility, scale and security to support the...
View ArticleHybrid Cloud: What The CFO Wants To Know
Operating a modern business requires IT organizations to reexamine their infrastructure. No longer can traditional monolithic systems provide the speed, flexibility, scale and security to support the...
View ArticleWhere Is My Cybersecurity Rosetta Stone?
This week’s theme for National Cyber Security Awareness Month is “Cyber from the Break Room to the Board Room.” Communication, like anything else worth getting better at, takes practice. Sometimes it...
View ArticleIdentity and Access Management Strategies: IAM Spending to Increase in Europe
Businesses around the world recognize that it’s crucial to take the necessary precautions to verify identities and manage digital credentials when conducting business online. In fact, a recent study...
View ArticleWhat Influences Your Cloud Strategy for Microsoft Apps?
For most organizations, some form of transition to cloud is inevitable. As you’re defining your cloud strategy, you’ll either choose to adopt, plan for future transition or justify why you’re not...
View ArticleMulti-layered Analysis of a Threat Pattern
If you do not fully know the asset, how can you protect it? This is the first challenge security practitioners face during any activity, whether it is a penetration test, code review, risk assessment,...
View ArticleData Lake and the Cloud: Pros and Cons of Putting Big Data Analytics in the...
A question that I surprisingly never get asked is “what about putting the data lake in The Cloud?” Now maybe I’m not asked that question because organizations are still confused as to what is a data...
View ArticlePutting Ransomware Criminals Out of Business
The advent of anonymous peer-to-peer networks such as bitcoin have enabled cyber-criminals to not only steal and sell your data, they can cut out the middleman and get their ill-gotten rewards...
View ArticleWhy a Cyber Risk Assessment Is Essential for M&A Due Diligence
According to J.P. Morgan, the global mergers and acquisitions (M&A) market amounted to $5 trillion in 2015 and continues to show strong levels of growth. When it comes to M&A, the due...
View ArticleTimeless Opportunity – Is There Such a Thing in Our Ever-Changing World?
“What do you do with The Huggers? I have many of those!” “You hug them back! It’s simple, don’t fight them.” When I heard this conversation, I wasn’t very sure I was in the right meeting room. I...
View Article#untitled – AKA my first DellEMC World Post
What am I doing here? Connecting the dots. If you read my previous post about Alliances, you know how important I think it is that we are working very closely with our peers. I shared a ride from the...
View ArticleDell EMC World 2016: Let The Transformation Begin
Today, we kick off Dell EMC World in Austin! Nearly 8,000 IT professionals from across the globe will be joining us to learn how they can transform their organizations into digital enterprises. Our...
View ArticleData Analytics and Cloud Native Apps: Essential for Digital Transformation
Today’s customers interact with businesses like never before. Whether they’re on online or using a mobile app, customers have come to expect services that are always available, with real-time...
View ArticleAnalytic Insights Module from Dell EMC: Batteries Included and No Assembly...
If you have kids (or buy presents for kids!), you understand the value of a present that comes ready to use – no need to buy batteries, no assembly required, no complex packaging, no need to download...
View ArticleVxRail 4.0 = 250x more. 25% smaller. 200x more flash. 40% faster.
I think with XtremIO and with VxRail – Dell EMC is showing how quickly we can move. In both the AFA segment and the HCI segment, we were late out of the starting blocks and startups thought maybe...
View ArticleAnalytics Insight Modulewhat is this?
At it’s core – a simple idea: People are spending way too much time on the analytics lifecycle versus on actionable intelligence – and the Analytics Insight Module (AIM) makes it simple. Like many...
View ArticleAnalytics the Easy Way with Analytic Insights Module
The last week of September 2016, Dell EMC was a part of Strata+Hadoop World in New York City at the Jacob Javits Center. I was staying in New Jersey at the time and I had to think about all the ways I...
View Article