March 2015- We live in a world that is changing at a rapid pace - the forces of cloud, social, big data, and mobile have compelled businesses to undergo a deep-rooted transformation and organizations must become service oriented to meet the demands. Software-defined storage (SDS) is an emerging paradign that is flexible, scalable, and highly automated that works across traditional silos. In this IDC whitepaper, learn how SDS platforms offer a compelling value proposition and how Dell ...
Over the past few years, converged infrastructure systems have been readily adopted by businesses, traditionally built using a three-tier architecture. While these systems work well in stable environments, when a virtualization environment is dynamic with unpredictable growth, these traditional three-tier architectures lack the features needed to operate efficiently.
In this solution brief, we will examine what constitutes a dynamic virtualized environment and learn how the Dell XC Web-scale HyperConverged series, which is supported ...
March 2015- This white paper is for security professionals who want to understand how to embed security into the Agile SDLC. It describes Agile development and the issues developers face, so both teams can work together better. Agile frameworks have become the new foundation for code development, and secure development practices, just like every other facet of development, must fit within the Agile framework not the other way around.
March 2015- This report describes strategies for articulating your risk posture and security strategy to executives so you can position yourself as a key influencer in the boardroom. Written by a CISO, it offers guidance on: answering common questions such as “How secure are we”; describing how your strategy aligns with the goals of the business; and helping the board understand complex security issues.
March 2015- To ensure security these days, the entire diverse and distributed enterprise identity infrastructure must become one secure global service. A federated identity service based on virtualization is the answer for protecting today's increasingly federated environments—and evolving them to meet future demands and opportunities. In this paper, we'll look at how such a service helps you manage all this complexity and see how other solutions stack up.
March 2015- Many organizations still cling to the rigid practice of reimaging every infected machine. However, the costs of reimaging often outweighs the benefit. Learn why you should adopt an alternative approach to reimaging to remediate threats.
March 2015- Spear phishing is a primary means by which APTs target and infiltrate networks. This paper describes the element of a phishing attack and how to keep your organization safe from advanced threats.
March 2015- This paper outlines the challenges of fighting APTs and outlines a solution purpose-built to find and stop attacks in progress allowing for mitigation before it's too late.
Riverbed SteelHead SaaS addresses cloud services/software as a service (SaaS) performance challenges by providing an easy-to-deploy optimization solution that meets customer needs for application performance over WAN and Internet connections.
Combining private wide area network (WAN) and public internet optimization, the SteelHead SaaS is a first-of-its-kind solution, which optimizes traffic across the public Internet with Riverbed's award-winning SteelHead optimization system (formerly RiOS or Riverbed Optimization System) technology to accelerate data and application ...
May 2014- Nobody can afford to lose data. But managing data, including backup and availability, in far-flung locations can present many logistical and technological challenges that bring complexity, expense, and risk. It doesn't have to be that way, though. A new branch converged infrastructure approach allows organizations to project virtual servers and data to remote offices, providing for local access and performance while storing the data in centralized data centers. Enterprises can now do business across the ...
May 2013- To increase agility while lowering costs, IT organizations are using virtualization and cloud-based infrastructure services to consolidate and reduce the number of physical servers and data centers across the enterprise. IDC estimates that, by 2015, more than 20 percent of the information running through servers will do so on virtualized systems. This percentage increases along with the size of the company, with some larger organizations using 100 percent virtualized systems. Read this paper to learn more.
November 2014- The path is clear. To accommodate new business demands, IT must institute changes in the way it manages and monitors its networks. Indeed, Gartner's 2013 report "Is MPLS Dead?" noted: "Network architects should revise WAN architectures to improve performance for external cloud applications and resources. In most cases, hybrid WAN architectures will provide the best blend of performance and availability." What kinds of shifts in its capabilities should IT be thinking about? They coalesce around four ...
November 2013- This joint paper from EMC and Adallom provides a brief overview of emerging gaps and trust issues common to SaaS providers.
December 2014- Database users are increasingly interested in using Flash-based solid-state drives (SSDs) to speed up application performance. For many database administrators (DBAs), increased database performance directly impacts their user experience and bottom lines. Accelerating a single MySQL instance may allow DBAs to avoid painful sharding exercises, with all their attendant administration, application changes, and high capital and ongoing costs. With the wide range of SSDs available today, choosing any one can be difficult. This paper aims ...
February 2015- Today's cybercrime environment has evolved from quick smash-and-grab tactics to persistent campaigns involving specialized malware. In response, a new category of security technology aimed at detecting, analyzing and preventing such threats is emerging. ThreatTrack Security discussed this trend with Charles Kolodgy, IDC's Research Vice President for IDC's Security Products Service.
September 2014- Today's cyber attacks have changed in sophistication, in focus, and in their potential impact on your business. This eBook will outline the tactics today's advanced attackers are using to break into your organization and why you require a defense-in-depth cyber-security program that incorporates automatic detection and incident response. The goal of this eBook is to leave you with the knowledge you need to effectively protect your business against today's advanced attacks.
January 2015- You can't open a newspaper or visit an online news site these days without some mention of a cyber-attack or data breach. These activities are becoming more prevalent, and as a result, the reporting of these activities is also on the rise. Bit9 + Carbon Black reached out to a series of experts to collect their thoughts and advice on dealing with data security incidents or breaches, which included:
- What solutions ...
Businesses need to view security as a process and leverage solutions that can proactively collect data, apply aggregated threat intelligence, reduce the cost and complexity of incident response and evolve, adapt and learn from your investigation.
This eGuide will cover how a continuous approach to response can resolve these challenges and put your organization in a better security posture by proactively preparing for a breach.
February 2015- A how to guide describing the key steps that organizations should take to prevent their social media accounts from being hacked.
Cloud offers the potential to not only transform how supply chain organizations procure IT capabilities, but also to fundamentally change how they manage business processes.
Whether in the volatility of demand, requirements for shorter lead-times, or the acquisition of new capabilities, the "clock speed" for businesses is running faster and faster for most manufacturers today while the delivery of traditional IT capabilities are struggling to keep up.
This IDC paper illustrates ...
Imagine a world where physical objects exchange knowledge and cooperate together like teammates to achieve unparalleled business efficiency. From textile looms to shipping pallets to store shelves, everything in the supply chain would sync, automatically, to optimize operations.
The Internet of Things is bringing about that world at a furious pace—very soon over 26 billion devices of all shapes and sizes will be connected to the Internet. Retailers and manufacturers will face ...
February 2015- Today's business environment has reached a level of complexity that is unparalleled in history. With the increasingly global nature of business, a business community that is geographically and technologically diverse, and a general urgency to be flexible enough to respond to market changes, companies from all industries are struggling to compete. This white paper analyzes trends and related steps that companies are taking to evolve, consolidate, and modernize their legacy B2B collaboration exchange environments ...
February 2015- The world is undergoing a series of economic, societal and environmental changes that will require companies to be more innovative and more agile than ever before. Technology can be an enabler for much of this organizational reinvention, with one caveat: the way technology works within the organization also needs to change.
February 2015- 3 reasons (and 4 steps) for consolidating your file transfer infrastructure now! Legacy connections, disjointed file transfer mechanisms, and redundant or expensive VANs/VPNs and FTP servers can cause weaknesses in your file transfer infrastructure, leading to escalated costs, increased risk and even damaged business relationships. This white paper details how consolidating your file transfer infrastructure can save money and drive core revenue, reduce complexity and risk, and improve service.
February 2015- 1 out of 4 organizations have failed a security audit. Will you be one of them? Ovum Consulting asked hundreds of executive-level IT buyers from around the world some very tough questions about their ability to govern the flow of their enterprise data. Their answers may surprise you. For instance: 23% of respondents had failed a security audit within the last three years; 17% had no confidence they could pass such an audit using their existing file transfer solutions; ...
View All Categories
Business Intelligence : Analytics, Business Process Management, Content management, Dashboards, Data Mining, Data Quality, Databases, Datamarts/Data Warehouses, Information Management, Knowledge Management, Performance Management
Hardware : Blades, Data centers, Desktops/PCs, Grid/Cluster Computing, Handhelds/PDAs, Macintosh, Peripherals, Processors, Supercomputers, Unix/Linux servers, Utility/On-demand Computing, Virtualization Hardware, Windows Servers
Infrastructure : ATM, Ethernet/Gigabit Ethernet, Frame relay, IPv6, Traffic Management, Network/Systems Management, PBXs, Printers, Remote Access, Routers, Switches, UPS, VPNs, WAN Optimization/Acceleration, Wide Area File Services
Internet : B2B, B2C, Browsers, E-Business/E-Commerce, E-retail, Google, Internet Policy, Internet Security, Search, Social Networks, Traffic Reporting/Monitoring, Web 2.0, Web Development, Social Business
Management : Career Development, Executive Insights/Interviews, H-1B, Legal, Outsourcing, Personnel Management, Recruiting, Regulation/Compliance, ROI/TCO, Salary/Compensation, Small-Medium Business, Training, Workplace Trends
Personal Tech : Blackberry, Bluetooth, Bluray, Digital Cameras, Digital Music, Digital Rights Management, Global Positioning Systems, iPhone, iPod, Peripherals, Smartphones, TVs/Home Theater, Virtual worlds
Security : Antivirus, Application Security, Attacks/Breaches, Cyberterror, Encryption, End user/Client Security, Intrusion Prevention, NAC, Perimeter Security, Privacy, Security Administration, Storage Security, Vulnerabilities and Threats
Services : Business Process Outsourcing, Business Services, Disaster Recovery, Hosted Applications, Hosted Storage, Internet/Data Services, Outsourcing, Software as a Service, Systems Integration, Telecom/Voice Services
Software : Integration, Application Optimization, Business Systems Management, CRM, Database Applications, Databases, Development Tools, ERP, Hosted Software/Applications, Linux, Open Source, Operating Systems, Productivity Applications, Server Virtualization, Service Oriented Architecture, Web Services