Jeff Erramouspe

Your Office 365 Data Security – Is It Properly Protected?

By Jeff Erramouspe | November 25, 2015

Office 365 Data Security As more and more people collaborate and access data from outside the office and across multiple devices, the potential for SaaS data loss increases dramatically, and the damage can be catastrophic. A staggering 60 percent of

THOUGHT LEADERSHIP ARCHIVE

5 Things To Consider About Your Next Enterprise Sharing Solution

By Rajesh Ram

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction

Preventing Disastrous Events Through The Power of Anomaly Detection In Machine Data

By CloudTweaks

Preventing Disastrous Events Through the Power of Anomaly Detection in Machine Data In August, a single server failed and the NASDAQ went down for three hours. In January, GlobalPayments reported that a hack compromising millions of credit card accounts cost

The Paradox of Colocation Solutions

By Michael Hollander

Colocation Solutions According to Aberdeen Group and Ventana Research, one out of four enterprises surveyed expect their data to grow by more than 30 percent in the next year. In order to cope with the explosive increase in data, we

Why NSA Revelations Will Be Good For Cloud Security

By CloudTweaks

NSA Security Edward Snowden’s recent disclosures, including concerns about the NSA’s ability to break certain types of encryption, and the extent of surveillance on cloud service providers, put the entire cloud industry into an uproar. The bad news is that

Calculating the ROI on Cloud

The Cost of Cloud: Calculating the ROI on Cloud

By Shreekanth Joshi

Calculating the ROI on Cloud IDC calls cloud computing “one of the most potentially transformative developments in the information technology world in the last 20 years.” Many companies have already chosen virtualization – generating a straightforward and easily measurable ROI

Mark Carrizosa

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

By CloudTweaks

Record Breaches Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its

Move Over Brick And Mortar, Education-As-A-Service Is Taking Over

By Scott Skinger

Education-As-A-Service As Bob Dylan once said, “the times they are a-changin’.” Its a verse that sticks like glue in the back of my mind when I reflect on the technology landscape today. Just a few years ago, data analytics services

7 Cloud Security Mistakes Bound To Bite You

By CloudTweaks

7 Main Cloud Security Mistakes  Like sharks off the coast of North Carolina this summer, information security threats are lurking. And now that cloud computing is woven into the fabric of IT everywhere, specific risks to an enterprise’s data apply.

Choice: A Critical Factor For A Successful Business

By Isabelle Guis

A Critical Factor For A Successful Business One of the most valuable business assets a company has today is its data. The problem is that most companies don’t know how to structure their information and then effectively leverage it to

Rainmaking From The Cloud – CIOs Struggle To Keep Pace With IT Demands

By Brendan O'Brien

Rainmaking from the Cloud In the digital era, where customers can select virtually anything with a click of a button, they are demanding more choice; not only in products, but in how and when they pay for them. They expect

Multi or Hybrid Cloud, What’s the Difference?

Multi or Hybrid Cloud, What’s the Difference?

Multi Cloud You’ve likely heard about the latest trend in cloud computing commonly referred to as multi-cloud, and it is ...
Cloud Migration Strategies and Their Impact on Security and Governance

Cloud Migration Strategies and Their Impact on Security and Governance

Cloud Migration Strategies Public cloud migrations come in different shapes and sizes, but I see three major approaches. Each of ...
Who Leads Digital Transformation? Historically, It Was The CIO

Who Leads Digital Transformation? Historically, It Was The CIO

Who Leads Digital Transformation? On my way to the office last week, I was stopped at a stoplight that only ...
Back to the Future: 2018 Big Data and Data Science Prognostications

Back to the Future: 2018 Big Data and Data Science Prognostications

“We should study Science Fiction in order to understand what someday could become Science Fact.” – Dr. Who? Doc Brown? ...
Avoiding the IOT ‘Twister’ Business Strategy

Avoiding the IOT ‘Twister’ Business Strategy

IOT ‘Twister’ Most organizations’ ‪ IOT Strategy look like a game of ‪ ‘Twister’ with progress across important IOT capabilities such as architecture, technology, ...