RSA SecurID Customers Take Note: RSA Via Access is for You, Too!
Today, RSA announced a milestone – the upcoming 2015 release of RSA Via that includes RSA Via Access – a new hosted cloud-based authentication service for single sign-on to SaaS and on-premise web...
View ArticleEMC World: A Preview and Things on the Must See and Do List
Every EMC World I’ve been to has certain things in common: Fun! Friends! Learning! Community! Getting to take the detailed covers off things I’ve been hinting at… … And, of course, face-melting...
View ArticleDemonstrating the Value of Enterprise Hybrid Cloud at EMC World 2015
Edward Newman It’s been just about a year now since we announced the EHC solution at EMC World 2014, and boy what a difference a year makes. As EMC World 2015 is fast approaching, I’m really looking...
View ArticleSee Everything. Fear Nothing.
Organizations continue to invest in traditional log-centric SIEM tools without seeing the benefits that they have been promised. Sure, most SIEMs do a fine job of log collection, management and...
View ArticleIntroducing RSA Via and the Dawn of Smart Identity Solutions
Today, RSA is excited to announce a new product suite we call RSA Via. It has three main components and comes with a provocative claim: it’s one of the first smart identity solutions to protect from...
View ArticleEMC Isilon sessions and labs at EMC World 2015
EMC World 2015 is just two weeks away! If you plan on attending this event in Las Vegas, Nevada on May 4-7, you’ll have several opportunities for getting in-depth Isilon information through virtual...
View ArticleThe Evolution is Here: Moving Beyond Log Centric SIEM
Evolution is a powerful thing. Change in our external surroundings affects our genetic makeup over time. Humans have adapted over millions of years by dropping our tails, standing upright and...
View ArticleAutomated Valuation Frameworks
The slide below is copied from a presentation that I gave at an IT@Cork function in February of this year: The slide is meant to communicate a process whereby a data center architecture can move...
View ArticleWhy FS shouldn’t shy away from a platform shift
Financial Services organisations are hugely complex in terms of their business operations; they have retail arms, investment and fund management operations, insurance businesses and more. Many of...
View ArticleIs Your Storage Half Empty? Or Half Full?
Hypothetical question; if you’re storage array is 50% allocated is if half empty or half full? The pessimist would say it is half empty. The optimist would say it is half full. But most of the...
View ArticleA CIO-CDO Partnership
Retailer Staples created two complimentary teams to work on digital business initiatives, Kim S. Nash writes in the Wall Street Journal. One group, headed by CDO Faisal Masud designs customer-facing...
View ArticleCloud and the Customer Experience: Employee & Partner Empowerment
This blog was written by VJ Manickam of EMC's Customer Advocacy team. VJ engages with top level executives around the world to identify customer and partner needs. This is one of her recent takeaways...
View ArticleSecuring the Application Layer with RSA Web Threat Detection
Despite increasing investments in security, attacks and breaches continue at an alarming rate. Web and mobile applications are key areas where attackers invest their time and resources to understand...
View ArticleTo Boldly Go Where No Experience Has Gone Before
Carolyn Muise It’s that time again. There are only two weeks left until the crowds flood into the Solutions Expo at EMC World to learn, network and of course win some great giveaways. EMC’s Total...
View ArticleWhen Big Data Becomes More Valuable Than Your Products/Services
A recent global study across 1000 executives conducted by EMC and Capgemini reports the following: “64% of respondents said that big data is changing traditional business boundaries and enabling...
View ArticleWhere’s my Data? Increase Your Resiliency with Hybrid Cloud
Dinko Eror In the recent EMC Global Data Protection Index, we found that “64 % of the 3300 companies surveyed suffered disruption due to data loss and unplanned downtime—losing as much as $1.7...
View ArticleEscaping Security’s Dark Ages
We are living in the Dark Ages of security. We cling to outmoded world views and rely on tools and tactics from the past, and yet we are surprised to find ourselves living in an era of chaos and...
View ArticleSee Everything. Fear Nothing.
Organizations continue to invest in traditional log-centric SIEM tools without seeing the benefits that they have been promised. Sure, most SIEMs do a fine job of log collection, management and...
View ArticleIntroducing RSA Via and the Dawn of Smart Identity Solutions
Today, RSA is excited to announce a new product suite we call RSA Via. It has three main components and comes with a provocative claim: it’s one of the first smart identity solutions to protect from...
View ArticleThe Need for Advanced FRAUD Intelligence
“Victorious warriors win first and then go to war; defeated warriors go to war first and then seek to win.” ― Sun Tzu, The Art of War Over the past several years, the cybercrime marketplace has gone...
View Article