enterprisesecuritymag

virtualization

DevOps Automation: the key to Managing Machine Identities
Enterprisesecuritymag >> cxoinsights

Manual managing machine identities can lead to some specific cybersecurity problems. DevOps is perceived to be agile, and it defeats the purpose of agility when the work is manual. The time spent on manual management of machine identities can...

Security and Vulnerability Assessments through Cloud Platforms
Enterprisesecuritymag >> cioviewpoint

While organizations face many issues with data security, cloud providers have today convinced them that the data is secured. Public cloud environments like AWS represented a reduced security burden for the companies. Cloud manager has to monitor...

Fusion of Artificial Intelligence and Cloud Computing
Enterprisesecuritymag >> cxoinsights

The world of data production, interpretation, and storage is changing radically because the technology around the world is changing. New technologies like IoT, cloud computing, machine learning, and virtualization are fueling the technological...

Three Innovative Cybersecurity Technologies of 2018
Enterprisesecuritymag >> cxoinsights

The ongoing war between security experts and cyber actors have become a cat and mouse game. This era of digital transformation is affecting the cybersecurity, and therefore this ever-changing industry has to be more responsible regarding the cyber...

Information Security Means Never Being Done
Enterprisesecuritymag >> cxoinsights

Dan Callahan, VP, Cloud Services, CGNET

Do you recall the story of Sisyphus? He was the Greek god whose punishment for a life of indiscretions was to roll a boulder to the top of a hill—and then watch as it rolled to the bottom. Managers in charge of information security can...

Edge Computing: Does it support customer intimacy and the race to digitization
Enterprisesecuritymag >> cioviewpoint

Mark Thiele, CIO & CSO, Apcera and President & Founder, Data Center Pulse

Does Edge Computing Matter to Enterprise IT? Edge computing, like IoT, AI/ML, drones, Augmented Reality (AR), etc. is all the rage these days. What does edge computing matter to my enterprise though? We have public cloud, colocation, private...

Service Providers Securing the Future of Virtualized Networks
Enterprisesecuritymag >> cioviewpoint

The telecom industry has undergone a drastic transformation from 3G to 4G, along with long-term evolution networks (LTE) led by the fast penetration of IoT devices into the market. In parallel, mobile devices are transforming too. The modern...

Security Advantages of Software Defined Networking (SDN)
Enterprisesecuritymag >> cxoinsights

Dr. Edward Amoroso, Member of the Board of Directors, M&T Bank

Perhaps the defining aspect of wide-area routing over Internet infrastructure has been decentralized control. Routers are manufactured to support protocols as stand-alone entities that accept, process, and route packets independently based on...

Software-Defined Security: The Missing Piece in Your SDDC Strategy
Enterprisesecuritymag >> cioviewpoint

Shishir Singh, VP, Network Security, Intel Security

It seems the stars are finally aligning to bring the much-promised benefits of the software-defined datacenter within reach of enterprise users. You know the promises: When our data centers are software-defined, we'll deliver new services...

Kill the LAN!
Enterprisesecuritymag >> cxoinsights

Nick Roethel, Director of Technology Services (CIO), Metropolitan Transportation Commission

The LAN in the traditional sense is dying. For years, network engineers, suppliers and manufacturers have focused on multilayered, complex networks capable of routing traffic through a tapestry of complex equipment. Now, users demand simple...

Integrating Cloud Capability To Provide Reliability, Authentication, And Messaging Infrastructure
Enterprisesecuritymag >> cxoinsights

Kim Tracy, CIO, Northeastern Illinois University

Infrastructure To Tackle The Onslaught Of Digital Content And Mobile Devices In being a public university, we look for investments in IT infrastructure that we believe will definitely be of value. Of the key parameters I look at the future...

Why Security Pros Need to Embrace the Cloud
Enterprisesecuritymag >> cxoinsights

Jeffrey W. Brown, Chief Security and Information Risk Officer, BNY Mellon

Technology futurists predict that your entire data center could wind up in the cloud. This isn’t a distant vision or far off future state, either. In fact, some big companies, like Netflix, are already there. Gartner claims that by 2020, a...

Combating Organizational Financial Risks
Enterprisesecuritymag >> cioviewpoint

Cris Luce, CMO/CTO, Accuro AgriServices

The modern world is defined, in large part, by electronic communication and the massive storage and exchange of digital information. While the Internet and other systems allow companies to operate on a global basis and enable geographically...

Pushing the Needle of Innovation in Banking
Enterprisesecuritymag >> cxoinsights

Jojo Seva, CIO, NEFCU

Technology and NEFCU NEFCU is in a transformational phase where we intend to leverage existing and emerging technologies to be more strategic. For me, the essence of strategy is to create competitive advantage. Simply having a technology...

Eze Software: Optimizing Testing For Outcomes
Enterprisesecuritymag >> cioviewpoint

James Smith, Senior Managing Director, Eze Software

1.How has your software testing operating model changed during the last five years? Eze Software was formed in 2013, combining Eze OMS, RealTick (now Eze EMS) and Tradar (now Eze Portfolio Accounting). Our development effort has focused on...

Impact of Software Defined Transformation in the Enterprise
Enterprisesecuritymag >>

Vesko Pehlivanov, VP, Cybersecurity, Group CTO, Credit Suisse

Software Defined Networking is dead, long live Software Defined Networking. Software Defined Networking (SDN) never had a clear role in the traditional enterprise. It came in the guise of Open Flow as a solution looking for a problem. And the...

Delivery and Adoption of Cloud Computing
Enterprisesecuritymag >>

Michael Stoeckert, CTO, ProAssurance

What is “Cloud” ? Cloud computing delivery models provide users with on-demand access to a flexible, wide-ranging pool of technology assets composed of services, applications, servers, networks, and storage facilities. Due to the...

Formulating Solutions To Stay Close To The Users
Enterprisesecuritymag >>

Randall C. Cieslak, CIO, Pacific Command

Things done while tuning and elevating IT's relationship with the government functions process transformation efforts Our focus is to stay close to the users and involved with the improvements they wish to make. When we have technology...

Is Your Corporation Suffering From 'Data Sprawl'?
Enterprisesecuritymag >>

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3

Francois Wolf, Vice-President and Chief Marketing Officer, Pivot3 Information today moves at a breakneck speed and the amount of data produced worldwide every day is staggering. With each new device and system added to a network, a...

Consolidation of GSA IT
Enterprisesecuritymag >>

David Shive, CIO, GSA

David Shive, CIO, GSA On July 30 of this year I was honored to be named the Chief Information Officer (CIO) of the United States General Services Administration (GSA). The role of CIO here at GSA comes with a legacy of innovation, early...