previous-editions

Big Breaches, Big Data, Big Context How to Empower the Next Generation of Security Threat Detection

It can take months or even years before a data breach is detected. The latest statistics from Ponemon Institute’s 2018 Cost of Data Breach Report outlines that it takes an average of 197 days to identify a breach. That means someone is in your network, on your systems, in your applications for over six months before they’re detected, IF they’re detected. That’s six months! On the higher end of the same report, there are companies that have been breached for years before they realize it. For example, sources indicate the Marriott data breach occurred back in 2014, but it was not disclosed until 2018. The scale of that breach is still being evaluated and it seems to get bigger and more impactful as more information is discovered.

Read more

Around The Storage Block

In this abbreviated article based on an Around the Storage Block blog post, my colleague Simon Watkins looked at what customers said about HPE StoreOnce. There were too many quotes to include in my article so be sure to read the article on ATSB to see everything that was said. Here’s the article from Simon.

Read more

Protecting your most vital applications and data with HPE Mission Critical Software

In our connected 24×7 economy, experiencing downtime for most applications has become cost-prohibitive for business, not only financially but also in loss of reputation. Minimizing downtime has long been a core tenet of IT teams the world over, especially those working with vital applications such as enterprise resource planning, core banking, electronic healthcare and more. In HPE, we have vast experience and proven solutions in the mission-critical computing space. We start at the infrastructure level with our well known mission-critical servers, with a unique and comprehensive set of built-in RAS (reliability, availability, and serviceability) capabilities that result in high levels of single-system uptime. Single-system availability is of great value, and a fundamental component of any mission-critical environment; but it´s not enough when the end result must be maximum application uptime across the IT stack. Ultimately, the business cares about the availability of business functionality, and that comes directly from the applications. And so, application-targeted high availability is paramount for this type of IT deployment.

Read more

HPE and VMware Team Up to Bring You the Full Cloud Experience in Your Data Center

To judge by some of the articles I see in the tech press, you’d think that IT departments these days have to be the technology equivalent of ninjas – able to spin on a dime in combative business environments and wield killer transformations at a moment’s notice. Well, exaggerated as that picture might be (for most companies anyway!), there’s more than a grain of truth there. Most IT shops do want to be a lot more maneuverable and responsive to what the business is asking for, no question. They want to get new apps and services out the door faster and grab new market spaces before competitors can muscle in.

Read more

How Hybrid Cloud Simplifies Data Sovereignty Challenges

Many organizations are turning to the public cloud, taking advantage of the speed it enables developers to deploy applications in their organizations.  According to IDG in their 2018 Cloud Computing Survey, 73% of organizations have at least one application, or a portion of their computing infrastructure in the cloud.[1] But in some cases, certain data and applications cannot run in the public cloud due to data sovereignty and compliance policies.

Read more

Six tips for choosing the right data security solution for big data environments

Data is money. For some organisations, data has become the highest commodity, and this means consumers now hold the power. By gathering these large data sets, businesses can analyse human behaviour and interactions through trends, market patterns and associations which will fundamentally lead them to make business decisions to tailor experiences for consumers. Big data is big business and enterprises of all sizes are investing in data science and analytical platforms. Whenever data is mentioned, security should automatically follow; especially when you consider big data is everywhere – on-premise, in the cloud, streaming from sensors and devices, and moving further across the internet.

Read more

If Digital Identity is the new perimeter, your IoT platform is in trouble. How Distributed Ledgers might save it?

The traditional network-based security perimeter is obsolete. A pervasive adoption of cloud services by the enterprise, the mushrooming number of personal devices (such as smartphones and wearables, namely BYOD), and the commoditization of mobile apps for Multi-Factor Authentication (MFA) redefined the requirements to defend the enterprise digital perimeter.

Read more

Why Is “Data Governance” The Key To A Data-Driven Business?

One of the most critical assets of any organization is data. Nowadays, the amount of data organizations are generating is amazing. At the heart of this, all is data governance. Today, Data Governance is a hot topic. However, despite all the articles and white papers devoted to data governance, it seems that some leaders still do not know what it is. This article will help clarify things or at best shed some light into the topic.

Read more

You complete me:
What is HPE Complete?

A couple of months ago, I did a Chalk Talk that gave a description of the HPE Complete program. The HPE Complete program resells best-in-class third party branded products that complement and complete HPE native solutions. When something is worth my time to do a Chalk Talk, I try to also do a blog post on the topic. I just updated the Chalk Talk with a few new partners in the Complete program so now’s a great time to highlight the program. 

Read more