How moving inventory to the cloud can streamline your business [Q&A ]

Cloud

A major trend we've been seeing in inventory management (and business, in general) is for companies to move from a desktop solution to a cloud solution. This has profound implications for the nature of how businesses manage their inventory, and we thought it would be interesting to get the low down on this trend from an industry expert.

Christy Hair is an inventory solution specialist with Boxstorm,  an online inventory management specialist. We asked her a series of questions about cloud inventory management and how moving a company's inventory to the cloud can help it streamline its processes in new ways.

Continue reading

Fewer than five percent of enterprise apps will move to the cloud in 2018

cloud stop sign

A new study of over 160 IT directors and chief technology officers at companies with more than 1,000 employees shows that while 78 percent are planning to upgrade their enterprise applications, the cloud doesn't feature in many plans.

The survey by digital experience platform Sapho reveals that fewer than five percent of enterprise apps will migrate to the cloud from on-premises in 2018, mainly because of security and compliance issues, but also because many of these apps are so ingrained in daily business processes, they can't be moved.

Continue reading

State-sponsored attacks expected to dominate 2018 threat landscape

World map with code

With 1.9 billion records stolen in the first six months, more than in the whole of 2016, 2017 proved a bumper year for cyber crime.

According to cyber security company Venafi, this trend is set to continue into 2018, with state-sponsored attacks to the fore.

Continue reading

Organizations could face up to $19 billion in losses if a cloud provider is hacked

Data cloud lock

If a hacker were to gain control of a cloud provider for over three days, businesses could face losses up to a whopping $19 billion, with SMBs carrying the largest economic and insurance losses, according to a new report.

In partnership with the American Institutes for Research (AIR), insurance market Lloyd's of London is unveiling a new report detailing the financial impact of a cyberattack on a US cloud provider.

Continue reading

Businesses need a risk-based approach to tackle vulnerabilities like Meltdown

risk jigsaw piece

The recent Spectre and Meltdown vulnerabilities have been well documented, but for businesses it can be difficult to know which fixes to prioritize.

Software management and security specialist Flexera is announcing a set of recommendations to provide a standardized, risk-based approach to managing this type of vulnerability.

Continue reading

New solution delivers optimized remote monitoring and management

remote access

Remote offices and decentralization, plus outsourcing, often mean it isn't feasible to have a technician always on site to solve IT problems.

This means many organizations turn to remote management and monitoring of systems and a leader in this field Kaseya is launching its second generation solution aimed at managed service providers and mid-sized companies.

Continue reading

HyperStore platform lets businesses unify cloud and in-house storage

cloud network

The rise of the cloud has made for greater complexity in business IT environments, with data accumulating on different platforms and in different locations.

To address this problem, object storage company Cloudian is launching a new version of its HyperStore platform which integrates data management capabilities to bridge traditional and cloud native environments, as well as object and file storage types.

Continue reading

Corporate cultural issues hold back secure software development

Stop hand signal

As the digital economy expands and software becomes more critical, security worries grow. In a new survey, 74 percent of respondents agree that security threats due to software and code issues are a growing concern.

The study of over 1,200 IT leaders, conducted by analysts Freeform Dynamics for software company CA Technologies, finds 58 percent of respondents cite existing culture and lack of skills as hurdles to being able to embed security within processes.

Continue reading

New API sheds light on the dark web

Dark web hacker

Gaining threat intelligence from the dark web can be a difficult task for security providers due to its unstructured nature.

Similarly, when data breaches occur, companies often face the problem of knowing exactly which data has been exposed on underground marketplaces.

Continue reading

Hackers gear up to target Winter Olympics

Olympic skiing

With the 24th Winter Olympics due to start in Pyeongchang, South Korea in a few weeks, athletes are not the only ones preparing for the event.

A report from security analytics platform Cybereason shows that hackers and cyber criminals are gearing up too, the scale and cost of the event making it a prime target.

Continue reading

New platform integrates Windows file servers with the cloud

Cloud server

Although businesses are keen to move to the cloud and IaaS solutions, most still have files stored on in-house servers.

Enterprise file sharing and sync platform FileCloud is launching a new product called ServerSync that integrates Microsoft Windows file servers with any IaaS cloud.

Continue reading

How behavioral analytics help to fight insider threats

insider threat

In the increasingly complex threat landscape faced by businesses, insiders continue to be a problem, accounting for around half of data breaches, according to a recent Forrester report.

One way that companies are combating this threat is with the use of User and Entity Behavior Analytics (UEBA). This detects abnormal behavior, adds contextual information to confirm the behavior is abnormal, and then prioritizes the riskiest insiders for analysts to investigate.

Continue reading

New AI platform helps companies with GDPR compliance

GDPR touchscreen

At the heart of the forthcoming GDPR legislation is the protection of personal data. For businesses this means being able to identify data that’s covered, including where it’s held and how it’s processed.

California-based Algorithmic IT Operations (AIOps) specialist Loom Systems is launching a new platform and virtual IT data analyst that helps users maintain GDPR compliance with just a click of a button.

Continue reading

New SDK helps deliver best practice privileged account management

Admin login

The idea of security by design is something we'll hear much more of as GDPR implementation looms. But many organizations still struggle when it comes to implementing a least privilege security model.

Access management specialist Thycotic is launching a new command line interface for its Secret Server privileged account management solution, enabling DevOps teams to bring best practice privileged account management to their code, build scripts, and configuration files.

Continue reading

AI is moving into the enterprise mainstream

Artificial intelligence

Artificial intelligence is often seen as being a technology of the future, but a new study from natural language processing company Narrative Science reveals that 61 percent of businesses are already using AI.

Interest and investment in the technology is increasing too, 71 percent of respondents say their company has an 'innovation strategy' to drive investments in new technologies like AI. A majority of companies say they have budget dedicated to enabling innovation (59 percent) and expect that outlay to increase in 2018 (62 percent).

Continue reading

Load More Articles