December 21, 2018

The Most Prominent Data Breaches of 2018 – Part I

As the year draws to an end, we like to take stock of all the positives and negatives on our personal and professional fronts. We reminisce the victories, mull over the difficult times and make

Read More
December 13, 2018

How to Prepare for (and Avoid) Software Audits

Complex and highly interpretive, software audits are like an evil spirit that can cast a gloomy shadow on any organization’s profitability and reputation. However, as CIOs and IT specialists, you

Read More
December 10, 2018

How to Budget for Cybersecurity in 2019

While information security threats continue to multiply and data breaches take on never-seen-before levels, cybercrime issues are worsening in both, scale and depth. With the backing of cartels

Read More
November 29, 2018

Run Your Blockchain Technology on IBM LinuxONE

From finance and insurance, to retail and healthcare, blockchain technology has been all pervasive since emergence. Recent reports indicate that the global market for this technology is projected

Read More
November 14, 2018

Cybersecurity Threats Continue to Haunt the Healthcare Industry

No matter how large or small your business, data thefts, hacks and breaches have become the order of the day. Almost every single day, we wake up to news of cyber-attacks that originate in

Read More
November 08, 2018

How the Internet of Things (IoT) is Impacting Businesses

Have you ever wondered whether sci-fi movies inspire new technology or reality happens to be portrayed in movies slightly ahead of time? There are massive digital transformations that we see around

Read More
October 30, 2018

NVMe Flash Storage - Accelerate Business Efficiency and Speed

In a data-driven world, where real-time analytics and emerging technologies greatly impact your business decisions, the performance and endurance of large scale data are of utmost importance.

Read More
October 17, 2018

How to Manage the Inherent Risks of Your BYOD Policy

According to MarketResearchReports.biz, the global BYOD security market is expected to grow at a CAGR of 31.95 percent between 2013 and 2018. Whether it is about bringing down the time and effort

Read More
October 11, 2018

Protect Yourself and Your Business from Targeted Phishing

It is no surprise that if you have unsecured or poorly secured digital information, it may be stolen, hacked or breached at some point. Cyber criminals are always on the lookout for data that they

Read More
September 05, 2018

Integrating Multilayered Endpoint Protection into Your Backup and Recovery Strategy

For any business owner, one of the greatest fears today is loss of personal, financial or any other confidential information pertaining to the company, employees or clients. Information security

Read More
December 21, 2018

The Most Prominent Data Breaches of 2018 – Part I

As the year draws to an end, we like to take stock of all the positives and negatives on our personal and professional fronts. We reminisce the victories, mull over the difficult times and make

Read More
December 13, 2018

How to Prepare for (and Avoid) Software Audits

Complex and highly interpretive, software audits are like an evil spirit that can cast a gloomy shadow on any organization’s profitability and reputation. However, as CIOs and IT specialists, you

Read More
December 10, 2018

How to Budget for Cybersecurity in 2019

While information security threats continue to multiply and data breaches take on never-seen-before levels, cybercrime issues are worsening in both, scale and depth. With the backing of cartels

Read More
November 29, 2018

Run Your Blockchain Technology on IBM LinuxONE

From finance and insurance, to retail and healthcare, blockchain technology has been all pervasive since emergence. Recent reports indicate that the global market for this technology is projected

Read More
November 14, 2018

Cybersecurity Threats Continue to Haunt the Healthcare Industry

No matter how large or small your business, data thefts, hacks and breaches have become the order of the day. Almost every single day, we wake up to news of cyber-attacks that originate in

Read More
November 08, 2018

How the Internet of Things (IoT) is Impacting Businesses

Have you ever wondered whether sci-fi movies inspire new technology or reality happens to be portrayed in movies slightly ahead of time? There are massive digital transformations that we see around

Read More
October 30, 2018

NVMe Flash Storage - Accelerate Business Efficiency and Speed

In a data-driven world, where real-time analytics and emerging technologies greatly impact your business decisions, the performance and endurance of large scale data are of utmost importance.

Read More
October 17, 2018

How to Manage the Inherent Risks of Your BYOD Policy

According to MarketResearchReports.biz, the global BYOD security market is expected to grow at a CAGR of 31.95 percent between 2013 and 2018. Whether it is about bringing down the time and effort

Read More
October 11, 2018

Protect Yourself and Your Business from Targeted Phishing

It is no surprise that if you have unsecured or poorly secured digital information, it may be stolen, hacked or breached at some point. Cyber criminals are always on the lookout for data that they

Read More
September 05, 2018

Integrating Multilayered Endpoint Protection into Your Backup and Recovery Strategy

For any business owner, one of the greatest fears today is loss of personal, financial or any other confidential information pertaining to the company, employees or clients. Information security

Read More

The Most Prominent Data Breaches of 2018 – Part I

Posted by GlassHouse Systems on Dec 21, 2018 10:34:45 AM

As the year draws to an end, we like to take stock of all the positives and negatives on our personal and professional fronts. We reminisce the victories, mull over the difficult times and make resolutions that we intend to carry through in the upcoming year.

Read More

Topics: data breach

How to Prepare for (and Avoid) Software Audits

Posted by GlassHouse Systems on Dec 13, 2018 3:08:52 PM

Complex and highly interpretive, software audits are like an evil spirit that can cast a gloomy shadow on any organization’s profitability and reputation. However, as CIOs and IT specialists, you would know that if your company licenses any software, it is only a matter of time before the vendor sends you an audit notification. Larger players, such as Microsoft, SAP, Adobe, IBM and Oracle are known to send out frequent audit requests to their customers. In fact, given the surge in the use of multiple technologies and hybrid environments, many of these companies see software audits as a mainstream revenue generation mechanism.

Read More

Topics: SAM, software asset management, software audit defense

How to Budget for Cybersecurity in 2019

Posted by GlassHouse Systems on Dec 10, 2018 12:08:06 PM

While information security threats continue to multiply and data breaches take on never-seen-before levels, cybercrime issues are worsening in both, scale and depth. With the backing of cartels and mafia, hackers have greater access to resources, and are leading increasingly sophisticated attacks. Unfortunately, that means the lifeblood of the new digital economy, data and information, needs to be continually guarded and secured. As CIOs and CXOs, you want to ensure that your company invests in the best possible safeguards and systems to avoid being exploited at the hands of cybercriminals. Hence, budgeting for them correctly should be your priority.

Read More

Run Your Blockchain Technology on IBM LinuxONE

Posted by GlassHouse Systems on Nov 29, 2018 1:25:43 PM

From finance and insurance, to retail and healthcare, blockchain technology has been all pervasive since emergence. Recent reports indicate that the global market for this technology is projected to reach 20 billion USD by the end of 2024, while the overall market is expected to grow at a CAGR of 58.7%.

Read More

Topics: blockchain, mainframe, linux on z

Cybersecurity Threats Continue to Haunt the Healthcare Industry

Posted by GlassHouse Systems on Nov 14, 2018 11:48:06 AM

No matter how large or small your business, data thefts, hacks and breaches have become the order of the day. Almost every single day, we wake up to news of cyber-attacks that originate in different parts of the world and cripple businesses, institutions and even non-profit organizations for varying lengths of time. Such massive scale data thefts not only impact the credibility and continuity of your business, but also pose serious privacy concerns for the impacted parties, such as your clients, employees, shareholders, associates and vendors.

Read More

Topics: cyber security, managed security, Security

How the Internet of Things (IoT) is Impacting Businesses

Posted by GlassHouse Systems on Nov 8, 2018 1:35:04 PM

Have you ever wondered whether sci-fi movies inspire new technology or reality happens to be portrayed in movies slightly ahead of time? There are massive digital transformations that we see around our personal lives, as well as businesses have become intertwined with the Internet of Things (IoT). From smart homes, driverless cars and auto-calibrated stoplights, to app-based alerts for shopping, social interaction and professional requirements, gadgets and appliances have made our lives easy, intelligent and efficient. Virtually every device that we use hooks up to the internet through sensors, electronics, software, actuators or other embedded items that enable non-stop connection, collection or exchange of data and information.   

Read More

Topics: cyber security, IoT

NVMe Flash Storage - Accelerate Business Efficiency and Speed

Posted by GlassHouse Systems on Oct 30, 2018 11:09:15 AM

In a data-driven world, where real-time analytics and emerging technologies greatly impact your business decisions, the performance and endurance of large scale data are of utmost importance. While dealing with the ever increasing enterprise workload, CIOs and CEOs are constantly rethinking newer ways to capture, conserve, process, access and transform data.

Read More

Topics: storage

How to Manage the Inherent Risks of Your BYOD Policy

Posted by GlassHouse Systems on Oct 17, 2018 1:10:36 PM

According to MarketResearchReports.biz, the global BYOD security market is expected to grow at a CAGR of 31.95 percent between 2013 and 2018. Whether it is about bringing down the time and effort in device procurement, or increasing flexible and remote working arrangements, a Bring Your Own Device (BYOD) policy presents several advantages for any mid to large enterprise. Implementing this policy can contribute to reduction in hardware costs, as well as increase in employee productivity. In fact, BYOD is not just practical, fashionable and employee-friendly, but it also frees up the bandwidth of your IT asset management teams and positively impacts your bottom line.

Read More

Topics: endpoint, Security, Managed Security Services

Protect Yourself and Your Business from Targeted Phishing

Posted by GlassHouse Systems on Oct 11, 2018 10:54:38 AM

It is no surprise that if you have unsecured or poorly secured digital information, it may be stolen, hacked or breached at some point. Cyber criminals are always on the lookout for data that they can use for personal, unlawful, gains. In recent years, the number of extortion scams that have come to light, and the sheer volume of data hacks that have occurred, suggest that targeted phishing has gone mainstream. Fraudsters have been continually evolving their methods of deceit, launching scams on a global level and masking their attacks with greater authenticity, creativity and sophistication.

Read More

Topics: cyber security, phishing, Security, Managed Security Services

Integrating Multilayered Endpoint Protection into Your Backup and Recovery Strategy

Posted by GlassHouse Systems on Sep 5, 2018 11:30:00 AM

For any business owner, one of the greatest fears today is loss of personal, financial or any other confidential information pertaining to the company, employees or clients. Information security threats come in several shapes and forms and often from sources that you may never have imagined. While your company may invest in the best tools to protect, backup and recover the information on your servers or applications, your weakest link may be devices such as laptops, desktops, smartphones and printers. Basically, any gadget that accesses the internet from your network presents a potential opportunity for unauthorized users to access your data and information. Threats such as phishing or ransomware also usually get into your company systems through such endpoint devices.

Read More

Topics: endpoint, MSSP, Security, Backup