Type to SearchView Tags
Industries | Hi-Tech

Blog Category Listing

Remarkable Finding
84
It’s a good day when one receives research results that are both unanticipated and remarkable. Thanks to Jim Mercer, Research Director within IDC's DevOps Solutions research practice, and the IDC team, we recently experienced such a moment of truth...
“Trust but Verify” is Obsolete: Zero Trust Networking
207

Jan 13, 2021

“Trust but Verify” is Obsolete: Zero Trust Networking

Erik Goldoff CISSP CyberSecurity Consultant, Technical Architect

'Trust but Verify’ is obsolete, supplanted by the Zero Trust concept. Chances are, you already have the hardware and the software solutions you need to implement a Zero Trust environment, so the next step is designing and architecting the proper...
Data Loss Prevention
583

Oct 15, 2020

Understanding Data Loss Prevention (DLP) Program Maturity

Aaron Smith Information Protection Practice Lead; Director, Symantec Global Consulting

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed...
Recognize ‘Normal’
522
To paraphrase a well-known cliché, either you have been breached or you will be breached. You might not be able to prevent infiltration by malicious intent, but you can recognize abnormal versus normal and react quickly...
Zero to 90 MPH: An Agile Mantra for Rapid and Effective Sourcing
436

Jul 06, 2020

Zero to 90 MPH: An Agile Mantra for Rapid and Effective Sourcing

Abhishek Shankar SVP, Hi-Tech Industries and GM Enterprise Studio

Speed and agility are paramount when facing a crisis. But as Aesop’s hare knows all too well, it’s not all about speed—it’s the combination of speed and agility that wins the race. Companies that rely on speed only, without the benefit of agility,...
business needs to start conducting business
138
One of the pioneers in leadership, Peter Drucker, said, “The greatest danger in times of turbulence is not the turbulence; it is to act with yesterday’s logic.” The disruption caused by the worldwide pandemic presents a situation that demands...
Spike in Internet Traffic
380

May 14, 2020

COVID-19 Spike in Internet Traffic Impacts API Performance

John Cocke Principal Transformation Consultant

According to Akamai, 83% of the internet traffic on its secure network is external-facing API traffic. APIs, the connective tissue between people, between people and businesses, and between applications and databases, underpin user experiences that...
Accelerating successful
1,342
Businesses across the spectrum are expected to experience disruptions of some degree due to the COVID-19 impact. Changes at fundamental levels, as well as radical overhauls in existing structures and processes, are already in place to ensure...
Hospital Strengthens Systems
436

May 05, 2020

Hospital Strengthens Systems and Processes During Crisis

Lisa Sass Senior Principal Product Marketing Manager

How one hospital was able to quickly make technology changes during the pandemic response that enabled secure remote work, automated provisioning of IT, medical devices and accessories, and streamlined access to applications the hospital depends on...
Five Goals
1,881
https://community.broadcom.com/blogSecurity professionals like you have gone to significant extremes to keep your IAM operations running like a Tesla in ludicrous mode, but we also know there’s always room for improvement. You can take it to the...
Agile Initial Thoughts
1,449

Oct 22, 2019

SAFe 5.0 is Here: Our Initial Thoughts

Sue Laurent Principal Product Marketing Manager

The 2019 Global SAFe Summit in San Diego earlier this month, the members of the Digital Advisory and Consulting Services (DACS) team at Enterprise Studio by HCL Technologies want to share our initial thoughts on the release of SAFe 5.0. Read more...
LSH
3,129
Predictive analytics has the potential to enhance value-based care for patients while also driving down costs for payers and providers. As value-based care becomes the norm, next gen enterprises need to leverage predictive analytics to improve...
Data Mining
945

Apr 08, 2019

Role of IoT and Data Mining in the Tech Industry

Saravana Nallakamu SAP Digital CX Practice Lead

The Internet of Things (IoT) is the network connecting the world of tangibles to that of the intangibles, that is, a network of physical objects connected to the software cloud. With the increasing popularity of IoT, new solutions are designed using...
“Trust but Verify” is Obsolete: Zero Trust Networking
207

Jan 13, 2021

“Trust but Verify” is Obsolete: Zero Trust Networking

Erik Goldoff CISSP CyberSecurity Consultant, Technical Architect

'Trust but Verify’ is obsolete, supplanted by the Zero Trust concept. Chances are, you already have the hardware and the software solutions you need to implement a Zero Trust environment, so the next step is designing and architecting the proper...
Data Loss Prevention
583

Oct 15, 2020

Understanding Data Loss Prevention (DLP) Program Maturity

Aaron Smith Information Protection Practice Lead; Director, Symantec Global Consulting

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed...
Digital Customer
612
The advent of smartphones, smart appliances, artificial intelligence (AI), and machine learning (ML)-enabled cars has caused a shift in the way customers experience services. With the role of technology in the lives of customers increasing every day...
Remarkable Finding
84
It’s a good day when one receives research results that are both unanticipated and remarkable. Thanks to Jim Mercer, Research Director within IDC's DevOps Solutions research practice, and the IDC team, we recently experienced such a moment of truth...
Chat
694

Apr 12, 2019

Rise of Chatbots

Sandip Bhattacharya ASSOCIATE VICE PRESIDENT

A chatbot is loosely defined as a computer program which conducts conversation via auditory and textual methods. It is derived from the word “ChatterBot”, coined by Michael Mauldin in 1994. There are several derivatives – verbot, smartbot...

IDC DevOps Success Survey Yields Two Remarkable Findings
Adam Frary, MBA - Associate General Manager | March 18, 2021
84 Views

It’s a good day when one receives research results that are both unanticipated and remarkable.

Thanks to Jim Mercer, Research Director within IDC's DevOps Solutions research practice, and the IDC team, we recently experienced such a moment of truth when we analyzed data from our survey, “Decoding DevOps Successes Improves Business Outcomes.”

The survey’s 1,000 data rows and 79 pivot tables confirmed and quantified commonly held views about quality improvements, lead times and agility, among other topics. Here are some widely acknowledged DevOps benefits with impressive, quantitative results:

  • 70% of DevOps leaders reported they release updates daily or hourly.
  • Even lagging organizations reported lead-time improvements of 21-40%.
  • 27% of all organizations saw “massive improvement in quality” as a result of DevOps.

Two findings deserve special attention:

Remarkable Finding #1: DevOps delivers substantial gains in employee satisfaction, decision-making, learning, innovation, and communication for organizations at every level of DevOps attainment.

Remarkable Finding #2: Business executives and customers value DevOps highly, most even more so than IT counterparts.


“Trust but Verify” is Obsolete: Zero Trust Networking
Erik Goldoff - CISSP CyberSecurity Consultant, Technical Architect | January 13, 2021
207 Views

'Trust but Verify’ is obsolete, supplanted by the Zero Trust concept. Chances are, you already have the hardware and the software solutions you need to implement a Zero Trust environment, so the next step is designing and architecting the proper configuration.

Using a common organization structure to examine the effects of Zero Trust, topics covered include operating safely in the current threat environment, coordinating Zero Trust efforts, network access configuration, and incremental implementation suggestions. Goring further, topics also include considerations for narrowing the choice of domain users and domain computers, reducing the attack surface for data center resources, configuring OS firewalls to improve security, and policy changes.

Pick up practical technical insights on Zero Trust for reducing the attack surface and improving security posture. Learn when to go it alone in shifting to Zero Trust, and when to call in assistance, and considerations for design, architecture, and implementation.

If your enterprise is breached or compromised, you’ll quickly learn that “There’s no such thing as bad publicity” is a falsehood. Investigate applying Zero Trust to secure your environment.


Understanding Data Loss Prevention (DLP) Program Maturity
Aaron Smith - Information Protection Practice Lead; Director, Symantec Global Consulting | October 15, 2020
583 Views

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed. Many IT and Security teams have hit the crest of the first big wave of change and are taking a moment to look to the horizon and consider ways to improve their architectural and process resilience for the next wave of change.

By necessity, a large part of preparing for that next wave must be self-assessments of internal processes and programs that govern security products in the organizational environment and form our understanding of how those security products interrelate and adapt.

This series focuses on specifically and practically addressing DLP program maturity assessment processes and procedures, from beginning to end. We aim to arm our fellow security practitioners with the real practical tools and advice from people who know and use them daily so that they can use this knowledge to assess this complex and often misunderstood security program.

First up, core foundational elements of a DLP program self-assessment - the central categorical pillars of maturity that we will define, investigate, measure, and report on throughout this series. Our goal is to develop a unified lexicon for communicating about and measuring success, maturity, processes, and objectives for DLP programs.