Category Archives: Cyber security

How new tools help any business build ethical and sustainable supply chains

The next BriefingsDirect digital business innovations discussion explores new ways that companies gain improved visibility, analytics, and predictive responses to better manage supply-chain risk-and-reward sustainability factors. We’ll examine new tools and methods that can be combined to ease the assessment and remediation … Continue reading

Posted in Ariba, artificial intelligence, Business networks, Cloud computing, Cyber security, data analysis, Enterprise transformation, Information management, machine learning, Networked economy, procurement, retail, risk assessment, SAP Ariba, Security, Spot buying, supply chain | Tagged , , , , , , , , , , , , | Leave a comment

Panel explores new ways to solve the complexity of hybrid cloud monitoring

The next BriefingsDirect panel discussion focuses on improving performance and cost monitoring of various IT workloads in a multi-cloud world. We will now explore how multi-cloud adoption is forcing cloud monitoring and cost management to work in new ways for enterprises. … Continue reading

Posted in artificial intelligence, big data, Cloud computing, cloud messaging, Cyber security, data analysis, data center, Data center transformation, Enterprise architect, enterprise architecture, Enterprise transformation, hyperconverged infrastructure, Information management, machine learning, Micro Focus, multicloud, Security | Tagged , , , , , , , , , , , , | Leave a comment

Containers, microservices, and HCI help governments in Norway provide safer public data sharing

The next BriefingsDirect digital transformation success story examines how local governments in Norway benefit from a common platform approach for safe and efficient public data distribution. We’ll now learn how Norway’s 18 counties are gaining a common shared pool for … Continue reading

Posted in application transformation, Cloud computing, Cyber security, data center, Data center transformation, DevOps, electronic medical records, Enterprise architect, enterprise architecture, healthcare, Hewlett Packard Enterprise, Security, Software-defined storage | Tagged , , , , , , , , , , | Leave a comment

Pay-as-you-go IT models provide cost and operations advantages for Northrop Grumman

The next BriefingsDirect IT business model innovation interview explores how pay-as-you-go models have emerged as a new way to align information technology (IT) needs with business imperatives. We’ll now learn how global aerospace and defense integrator Northrop Grumman has sought … Continue reading

Posted in Cloud computing, Cyber security, Data center transformation, Enterprise architect, enterprise architecture, Enterprise transformation, Hewlett Packard Enterprise, HP, Software-defined storage, storage | Tagged , , , , , , , , , , , , | Leave a comment

A tale of two hospitals—How healthcare economics in Belgium hastens need for new IT buying schemes

The next BriefingsDirect data center financing agility interview explores how two Belgian hospitals are adjusting to dynamic healthcare economics to better compete and cooperate. We will now explore how a regional hospital seeking efficiency — and a teaching hospital seeking … Continue reading

Posted in application transformation, Cloud computing, Cyber security, data center, Data center transformation, disaster recovery, electronic medical records, Enterprise architect, enterprise architecture, Enterprise transformation, healthcare, Hewlett Packard Enterprise, Security, storage, User experience | Tagged , , , , , , , , , , , , | Leave a comment

How a large Missouri medical center developed an agile healthcare infrastructure security strategy

Healthcare provider organizations are among the most challenging environments to develop and implement comprehensive and agile security infrastructures. These providers of healthcare are usually sprawling campuses with large ecosystems of practitioners, suppliers, and patient-facing facilities. They also operate under stringent … Continue reading

Posted in application transformation, Bitdefender, Citrix, Cloud computing, Cyber security, Data center transformation, disaster recovery, Help desk, Identity, Security, server, User experience, Virtualization, VMware | Tagged , , , , , , , , , , , , , | Leave a comment

Kansas Development Finance Authority gains peace of mind, end-points virtual shield using hypervisor-level security

Implementing and managing IT security has leaped in complexity for organizations ranging from small and medium-sized businesses (SMBs) to massive government agencies. Once-safe products used to thwart invasions now have been exploited. E-mail phishing campaigns are far more sophisticated, leading … Continue reading

Posted in Bitdefender, Citrix, Cloud computing, Cyber security, data center, Data center transformation, Enterprise architect, machine learning, Microsoft, mobile computing, Security, server, Virtualization, VMware | Tagged , , , , , , , , , , , , , , | Leave a comment