Type to SearchView Tags
Industries | Hi-Tech

Blog Category Listing

Remarkable Finding
71
It’s a good day when one receives research results that are both unanticipated and remarkable. Thanks to Jim Mercer, Research Director within IDC's DevOps Solutions research practice, and the IDC team, we recently experienced such a moment of truth...
“Trust but Verify” is Obsolete: Zero Trust Networking
187

Jan 13, 2021

“Trust but Verify” is Obsolete: Zero Trust Networking

Erik Goldoff CISSP CyberSecurity Consultant, Technical Architect

'Trust but Verify’ is obsolete, supplanted by the Zero Trust concept. Chances are, you already have the hardware and the software solutions you need to implement a Zero Trust environment, so the next step is designing and architecting the proper...
Data Loss Prevention
563

Oct 15, 2020

Understanding Data Loss Prevention (DLP) Program Maturity

Aaron Smith Information Protection Practice Lead; Director, Symantec Global Consulting

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed...
Recognize ‘Normal’
515
To paraphrase a well-known cliché, either you have been breached or you will be breached. You might not be able to prevent infiltration by malicious intent, but you can recognize abnormal versus normal and react quickly...
Zero to 90 MPH: An Agile Mantra for Rapid and Effective Sourcing
429

Jul 06, 2020

Zero to 90 MPH: An Agile Mantra for Rapid and Effective Sourcing

Abhishek Shankar SVP, Hi-Tech Industries and GM Enterprise Studio

Speed and agility are paramount when facing a crisis. But as Aesop’s hare knows all too well, it’s not all about speed—it’s the combination of speed and agility that wins the race. Companies that rely on speed only, without the benefit of agility,...
business needs to start conducting business
134
One of the pioneers in leadership, Peter Drucker, said, “The greatest danger in times of turbulence is not the turbulence; it is to act with yesterday’s logic.” The disruption caused by the worldwide pandemic presents a situation that demands...
Spike in Internet Traffic
376

May 14, 2020

COVID-19 Spike in Internet Traffic Impacts API Performance

John Cocke Principal Transformation Consultant

According to Akamai, 83% of the internet traffic on its secure network is external-facing API traffic. APIs, the connective tissue between people, between people and businesses, and between applications and databases, underpin user experiences that...
Accelerating successful
1,337
Businesses across the spectrum are expected to experience disruptions of some degree due to the COVID-19 impact. Changes at fundamental levels, as well as radical overhauls in existing structures and processes, are already in place to ensure...
Hospital Strengthens Systems
432

May 05, 2020

Hospital Strengthens Systems and Processes During Crisis

Lisa Sass Senior Principal Product Marketing Manager

How one hospital was able to quickly make technology changes during the pandemic response that enabled secure remote work, automated provisioning of IT, medical devices and accessories, and streamlined access to applications the hospital depends on...
LSH
3,086
Predictive analytics has the potential to enhance value-based care for patients while also driving down costs for payers and providers. As value-based care becomes the norm, next gen enterprises need to leverage predictive analytics to improve...
Agile Initial Thoughts
1,415

Oct 22, 2019

SAFe 5.0 is Here: Our Initial Thoughts

Sue Laurent Principal Product Marketing Manager

The 2019 Global SAFe Summit in San Diego earlier this month, the members of the Digital Advisory and Consulting Services (DACS) team at Enterprise Studio by HCL Technologies want to share our initial thoughts on the release of SAFe 5.0. Read more...
Five Goals
1,814
https://community.broadcom.com/blogSecurity professionals like you have gone to significant extremes to keep your IAM operations running like a Tesla in ludicrous mode, but we also know there’s always room for improvement. You can take it to the...
Data Loss Prevention
563

Oct 15, 2020

Understanding Data Loss Prevention (DLP) Program Maturity

Aaron Smith Information Protection Practice Lead; Director, Symantec Global Consulting

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed...
Data Mining
917

Apr 08, 2019

Role of IoT and Data Mining in the Tech Industry

Saravana Nallakamu SAP Digital CX Practice Lead

The Internet of Things (IoT) is the network connecting the world of tangibles to that of the intangibles, that is, a network of physical objects connected to the software cloud. With the increasing popularity of IoT, new solutions are designed using...
cloud
525
Teams developing web- or cloud-based solutions have gone through a huge transformation, starting from the early web developments, then moving into cloud services and cloud applications and now doing full-fledged cloud-based computing. The teams that...
Digital Customer
595
The advent of smartphones, smart appliances, artificial intelligence (AI), and machine learning (ML)-enabled cars has caused a shift in the way customers experience services. With the role of technology in the lives of customers increasing every day...
Data Mining
281

Apr 08, 2019

Artificial Intelligence in Tech Industry

Sandip Bhattacharya ASSOCIATE VICE PRESIDENT

There are many concepts within the domain of artificial intelligence (AI), including machine learning (ML), deep learning, neural networks, natural learning processing (NLP), virtual reality (VR), Augmented Reality (AR), LSTM, and a few others. All...
Force Multipliers
1,328
Internet of Things (IoT) Security: Key Challenges & their Force Multipliers

IDC DevOps Success Survey Yields Two Remarkable Findings
Adam Frary, MBA - Associate General Manager | March 18, 2021
71 Views

It’s a good day when one receives research results that are both unanticipated and remarkable.

Thanks to Jim Mercer, Research Director within IDC's DevOps Solutions research practice, and the IDC team, we recently experienced such a moment of truth when we analyzed data from our survey, “Decoding DevOps Successes Improves Business Outcomes.”

The survey’s 1,000 data rows and 79 pivot tables confirmed and quantified commonly held views about quality improvements, lead times and agility, among other topics. Here are some widely acknowledged DevOps benefits with impressive, quantitative results:

  • 70% of DevOps leaders reported they release updates daily or hourly.
  • Even lagging organizations reported lead-time improvements of 21-40%.
  • 27% of all organizations saw “massive improvement in quality” as a result of DevOps.

Two findings deserve special attention:

Remarkable Finding #1: DevOps delivers substantial gains in employee satisfaction, decision-making, learning, innovation, and communication for organizations at every level of DevOps attainment.

Remarkable Finding #2: Business executives and customers value DevOps highly, most even more so than IT counterparts.


“Trust but Verify” is Obsolete: Zero Trust Networking
Erik Goldoff - CISSP CyberSecurity Consultant, Technical Architect | January 13, 2021
187 Views

'Trust but Verify’ is obsolete, supplanted by the Zero Trust concept. Chances are, you already have the hardware and the software solutions you need to implement a Zero Trust environment, so the next step is designing and architecting the proper configuration.

Using a common organization structure to examine the effects of Zero Trust, topics covered include operating safely in the current threat environment, coordinating Zero Trust efforts, network access configuration, and incremental implementation suggestions. Goring further, topics also include considerations for narrowing the choice of domain users and domain computers, reducing the attack surface for data center resources, configuring OS firewalls to improve security, and policy changes.

Pick up practical technical insights on Zero Trust for reducing the attack surface and improving security posture. Learn when to go it alone in shifting to Zero Trust, and when to call in assistance, and considerations for design, architecture, and implementation.

If your enterprise is breached or compromised, you’ll quickly learn that “There’s no such thing as bad publicity” is a falsehood. Investigate applying Zero Trust to secure your environment.


Understanding Data Loss Prevention (DLP) Program Maturity
Aaron Smith - Information Protection Practice Lead; Director, Symantec Global Consulting | October 15, 2020
563 Views

As workers move further away from shared office spaces - perhaps forever - and processes become more cloud-centric, security practitioners have baked security into network changes and application implementations that have unfolded at breakneck speed. Many IT and Security teams have hit the crest of the first big wave of change and are taking a moment to look to the horizon and consider ways to improve their architectural and process resilience for the next wave of change.

By necessity, a large part of preparing for that next wave must be self-assessments of internal processes and programs that govern security products in the organizational environment and form our understanding of how those security products interrelate and adapt.

This series focuses on specifically and practically addressing DLP program maturity assessment processes and procedures, from beginning to end. We aim to arm our fellow security practitioners with the real practical tools and advice from people who know and use them daily so that they can use this knowledge to assess this complex and often misunderstood security program.

First up, core foundational elements of a DLP program self-assessment - the central categorical pillars of maturity that we will define, investigate, measure, and report on throughout this series. Our goal is to develop a unified lexicon for communicating about and measuring success, maturity, processes, and objectives for DLP programs.