Type to SearchView Tags
Industries | Hi-Tech

Blog Category Listing

Data Loss Prevention
148

Oct 15, 2020

Understanding Data Loss Prevention (DLP) Program Maturity

Aaron Smith Information Protection Practice Lead; Director, Symantec Global Consulting

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed...
Recognize ‘Normal’
407
To paraphrase a well-known cliché, either you have been breached or you will be breached. You might not be able to prevent infiltration by malicious intent, but you can recognize abnormal versus normal and react quickly...
Zero to 90 MPH: An Agile Mantra for Rapid and Effective Sourcing
358

Jul 06, 2020

Zero to 90 MPH: An Agile Mantra for Rapid and Effective Sourcing

Abhishek Shankar SVP, Hi-Tech Industries and GM Enterprise Studio

Speed and agility are paramount when facing a crisis. But as Aesop’s hare knows all too well, it’s not all about speed—it’s the combination of speed and agility that wins the race. Companies that rely on speed only, without the benefit of agility,...
business needs to start conducting business
118
One of the pioneers in leadership, Peter Drucker, said, “The greatest danger in times of turbulence is not the turbulence; it is to act with yesterday’s logic.” The disruption caused by the worldwide pandemic presents a situation that demands...
Spike in Internet Traffic
336

May 14, 2020

COVID-19 Spike in Internet Traffic Impacts API Performance

John Cocke Principal Transformation Consultant

According to Akamai, 83% of the internet traffic on its secure network is external-facing API traffic. APIs, the connective tissue between people, between people and businesses, and between applications and databases, underpin user experiences that...
Accelerating successful
1,275
Businesses across the spectrum are expected to experience disruptions of some degree due to the COVID-19 impact. Changes at fundamental levels, as well as radical overhauls in existing structures and processes, are already in place to ensure...
Hospital Strengthens Systems
393

May 05, 2020

Hospital Strengthens Systems and Processes During Crisis

Lisa Sass Senior Principal Product Marketing Manager

How one hospital was able to quickly make technology changes during the pandemic response that enabled secure remote work, automated provisioning of IT, medical devices and accessories, and streamlined access to applications the hospital depends on...
cloud
287
Teams developing web- or cloud-based solutions have gone through a huge transformation, starting from the early web developments, then moving into cloud services and cloud applications and now doing full-fledged cloud-based computing. The teams that...
Agile
583
Now that agile is approaching its 20th birthday, it’s natural to ponder how agile can extend beyond IT. Agile’s core principles of customer first, collaboration, transparency, simplicity, excellence and communication can easily work for other...
LSH
2,734
Predictive analytics has the potential to enhance value-based care for patients while also driving down costs for payers and providers. As value-based care becomes the norm, next gen enterprises need to leverage predictive analytics to improve...
Data Loss Prevention
148

Oct 15, 2020

Understanding Data Loss Prevention (DLP) Program Maturity

Aaron Smith Information Protection Practice Lead; Director, Symantec Global Consulting

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed...
Five Goals
1,360
https://community.broadcom.com/blogSecurity professionals like you have gone to significant extremes to keep your IAM operations running like a Tesla in ludicrous mode, but we also know there’s always room for improvement. You can take it to the...
Agile Initial Thoughts
1,097

Oct 22, 2019

SAFe 5.0 is Here: Our Initial Thoughts

Sue Laurent Principal Product Marketing Manager

The 2019 Global SAFe Summit in San Diego earlier this month, the members of the Digital Advisory and Consulting Services (DACS) team at Enterprise Studio by HCL Technologies want to share our initial thoughts on the release of SAFe 5.0. Read more...
cloud
287
Teams developing web- or cloud-based solutions have gone through a huge transformation, starting from the early web developments, then moving into cloud services and cloud applications and now doing full-fledged cloud-based computing. The teams that...
Recognize ‘Normal’
407
To paraphrase a well-known cliché, either you have been breached or you will be breached. You might not be able to prevent infiltration by malicious intent, but you can recognize abnormal versus normal and react quickly...
Data Mining
755

Apr 08, 2019

Role of IoT and Data Mining in the Tech Industry

Saravana Nallakamu SAP Digital CX Practice Lead

The Internet of Things (IoT) is the network connecting the world of tangibles to that of the intangibles, that is, a network of physical objects connected to the software cloud. With the increasing popularity of IoT, new solutions are designed using...
Zero to 90 MPH: An Agile Mantra for Rapid and Effective Sourcing
358

Jul 06, 2020

Zero to 90 MPH: An Agile Mantra for Rapid and Effective Sourcing

Abhishek Shankar SVP, Hi-Tech Industries and GM Enterprise Studio

Speed and agility are paramount when facing a crisis. But as Aesop’s hare knows all too well, it’s not all about speed—it’s the combination of speed and agility that wins the race. Companies that rely on speed only, without the benefit of agility,...
Agile
803

Oct 09, 2018

Agile Digital Transformation

Ahmed Mithani Associate Vice President

Digital Transformation has been the new buzz for several years that encompasses a spectrum from simply moving processes to mobile platforms, to business process automation (RPA), to

Understanding Data Loss Prevention (DLP) Program Maturity
Aaron Smith - Information Protection Practice Lead; Director, Symantec Global Consulting | October 15, 2020
148 Views

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed. Many IT and Security teams have hit the crest of the first big wave of change and are taking a moment to look to the horizon and consider ways to improve their architectural and process resilience for the next wave of change.

By necessity, a large part of preparing for that next wave must be self-assessments of internal processes and programs that govern security products in the organizational environment and form our understanding of how those security products interrelate and adapt.

This series focuses on specifically and practically addressing DLP program maturity assessment processes and procedures, from beginning to end. We aim to arm our fellow security practitioners with the real practical tools and advice from people who know and use them daily so that they can use this knowledge to assess this complex and often misunderstood security program.

First up, core foundational elements of a DLP program self-assessment - the central categorical pillars of maturity that we will define, investigate, measure, and report on throughout this series. Our goal is to develop a unified lexicon for communicating about and measuring success, maturity, processes, and objectives for DLP programs.


Recognize ‘Normal’ to Detect ‘Abnormal’: The value of proactive baselining to protect from a data breach
Erik Goldoff - CISSP CyberSecurity Consultant, Technical Architect | July 15, 2020
407 Views

To paraphrase a well-known cliché, either you have been breached or you will be breached. You might not be able to prevent infiltration by malicious intent, but you can recognize abnormal versus normal and react quickly enough to implement your action plan. For those without a plan for a breach, these recommendations are a starting point; for those with a plan, it’s an excellent double-check.


Zero to 90 MPH: An Agile Mantra for Rapid and Effective Sourcing
Abhishek Shankar - SVP, Hi-Tech Industries and GM Enterprise Studio | July 6, 2020
358 Views

Speed and agility are paramount when facing a crisis. But as Aesop’s hare knows all too well, it’s not all about speed—it’s the combination of speed and agility that wins the race. Companies that rely on speed only, without the benefit of agility, may win the first heat. Agility makes speed sustainable, race after race, no matter what obstacles. Traditional RFPs lack speed, aren’t agile enough to handle the uncertainty of transformational projects and don’t easily accommodate collaboration, enterprises are moving toward agile workshops that leverage competitive dialogues to facilitate solid decision-making.