INFOGRAPHIC: Defending SaaS Applications from Data Loss - Don’t Play Games...
Did you know, 58% of businesses have experienced data loss in the past year? Cloud vendors diligently protect your data from mishaps and emergencies on their side of things; but preventing data loss...
View ArticleBi-Modal IT: A Brief History
Dave Shepherd A long long time ago in a Data Centre not too far away…. Mainframes and Personal Computers changed the way we do business… These investments were significant, both financially and...
View ArticleMarty, the Maestro and the Crown Jewels
Security. Vulnerability. Threats. Defense. For those of you in ‘the risk industry,’ these words roll off your tongue with the practiced agility and grace of a seasoned ballet principle. We use...
View ArticleAdvanced Malware Defense: The Need for Speed
According to the Verizon Data Breach Report 2015, 70 to 90 percent of malware samples are unique to an organization, which means the malware wouldn’t automatically be identified as a threat. This puts...
View ArticleMarty, the Maestro and the Crown Jewels
Vulnerability. Threats. Defense. For those of you in ‘the risk industry’, these words roll off your tongue with the practiced agility and grace of a seasoned ballet principal. We use these words...
View ArticleThoughts from 30,000 Feet: Are You Facing These 3 Common IT Transformation...
I spend a lot time in the air traveling to customer meetings around the globe. I hear first-hand about their frustrations and challenges in getting started with IT transformation. They are beyond the...
View ArticleIntroducing the Isilon API Info Hub
Would you like to automate routine Isilon cluster administration tasks? Maybe you need a custom tool to monitor your cluster, or your cluster administrators would like a nice, tidy script to allow...
View ArticlePrepare for the Digital Economy: EMC ApplicationXtender
Everyone seems to be talking about the digital economy these days. As W. Brian Arthur stated in his article, “The Second Economy”, digitalization is creating a second economy, a digital one, in which...
View ArticleSecuring eCommerce Transactions without Losing Customers Part 2 – Behavioral...
In Part 1 of this series we looked at using risk-based authentication to prevent account takeovers like the ones that victimized Starbucks and Uber customers and help reduce fraud chargebacks. In this...
View ArticleYamaha Motor Revs Up IT Innovation with EMC
Yamaha Motor creates products that the company promises will “Rev Your Heart.” That same spirit is at the heart of Yamaha Motor’s approach to innovate and revolutionize IT. To keep up with rapid...
View ArticleIs Your Data Protection Strategy Spinning Out of Control?
Who’s really directing the protection of your business data? Is it you, the administrator, founded on centralized IT policies, or rather is it based on the dynamic needs of your many stakeholders?...
View ArticleMaking an Impact on the Silicon Slopes
Last Friday, I had the privilege of hosting U.S. Senator Orrin Hatch at the EMC Utah Center of Excellence (CoE). Senator Hatch spoke on the state of Utah as a technology leader and noted EMC’s...
View ArticleThe Results are In…RSA Archer Won a Stevie Award
We’re very excited to share some great news – RSA Archer won a 2015 People’s Choice Stevie Award for Favorite New Product in the Software – Governance/Risk category. As you may know, the Stevies are...
View ArticleHelping Companies Succeed One Conversation at a Time
Building relationships is crucial to every successful business. I have the privilege of meeting with an average of 35 companies each month; some are longtime EMC customers and others are looking to...
View ArticleDon’t Build a Data Lake on Data Warehouse Infrastructure
Joseph DosSantos In my last blog, I introduced a framework for understanding the dimensions of change to address as part of a big data transformational journey. While the first blog addressed the...
View ArticleCome Find Us at VMworld 2015: Aug 30-Sept 3, San Francisco
At the end of this month, over 20,000 people will converge on Moscone Center to attend VMworld 2015, and Pivotal will be there as a Gold Sponsor. VMware will be showcasing their One Cloud, Any...
View ArticleCascading Risk: Lloyd’s “Blackout Report”
(image from Lloyd’s “Business Blackout” report) In early July, Lloyds published “Business Blackout: The insurance implications of an cyber attack on the US power grid,” a study of the financial impact...
View ArticleHow to Succeed With Big Data
In the past year, my Big Data journey has evolved into a successful, revenue-generating, innovation-enabling solution. How did I get here and what recommendations can I offer? First, properly set...
View ArticleSecuring eCommerce Transactions without Losing Customers Part 3 – 3D Secure
Part 1 of this series covered using risk-based authentication for account holders while Part 2 dove into behavioral analytics to reduce fraud chargebacks. In this post we will look at the strategic...
View ArticleMaking an Impact on the Silicon Slopes
Last Friday, I had the privilege of hosting U.S. Senator Orrin Hatch at the EMC Utah Center of Excellence (CoE). Senator Hatch spoke on the state of Utah as a technology leader and noted EMC’s...
View Article