Don’t Let ‘Trusted’ Vendors Become Cyber-Breach Enablers

Don’t Let ‘Trusted’ Vendors Become Cyber-Breach Enablers

What kind of programs to organizations have in place to manage vendor risk? In far too many instances, protections against...

July 10th, 2016 IT World Canada Team

IBM Cognos Analytics on Cloud

IBM Cognos Analytics on Cloud

Companies can now deliver centralized and reliable insights without spreading data across desktops and devices. IBM® Cognos® Analytics uses enterprise-class...

July 2nd, 2016 IT World Canada Team

Backup and Disaster Recovery: VMware on IBM Cloud with NetApp AltaVault

Backup and Disaster Recovery: VMware on IBM Cloud with NetApp AltaVault

In the case of a cloud deployment, data can be restored back to a virtual appliance. The NetApp AltaVault cloud-integrated...

June 23rd, 2016 IT World Canada Team

Secure Cloud Workloads: VMware on IBM Cloud with Intel Trusted Execution Technology

Secure Cloud Workloads: VMware on IBM Cloud with Intel Trusted Execution Technology

Organizations around the globe want to know how to secure their IT infrastructure. The Intel TXT, offered by IBM Cloud,...

June 23rd, 2016 IT World Canada Team

From hindsight to insight to foresight

From hindsight to insight to foresight

Companies should keep on eye on the bigger picture when choosing a Big Data analytics software to push the right...

June 20th, 2016 IT World Canada Team

A New Set Of Challenges Keeps Information Governance Professionals Up At Night

A New Set Of Challenges Keeps Information Governance Professionals Up At Night

The move to a more digital business means a decline in paper-based recordkeeping, and an organization must adapt to meet...

June 20th, 2016 IT World Canada Team

Can we save the open web?

Can we save the open web?

The open web allows users to freely publish and access content that is instantly viewable by millions world-wide. But what...

June 15th, 2016 IT World Canada Team

IDC: The Business Value of Printer Security

IDC: The Business Value of Printer Security

Printing assets and print-related technologies are an overlooked element of an organization’s IT security strategy. There are compelling reasons for...

June 12th, 2016 IT World Canada Team

Printer and Embedded Device Security

Printer and Embedded Device Security

Today, most organizations do not have a security strategy in place for printers and embedded devices, leading to cybersecurity threats...

June 12th, 2016 IT World Canada Team