May 22, 2018

Do You Need a SIEM for Your Security in 2018?

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a

Read More
May 08, 2018

How to Save Time and Money with Software Audit Defense

Working in the software industry can mean navigating a veritable minefield of licensed materials and products. Unexpected software audits come with the territory and can result in substantial

Read More
April 05, 2018

Nutanix on Power - Hyperconverged Infrastructure

Nutanix with IBM Power® Systems – Hyperconverged Infrastructure to Empower Your Data Centres

Read More
March 22, 2018

Blockchain on the IBM z14 Mainframe 

 

What comes to your mind when you hear the word blockchain? Do you think of it as just one of the latest technology trends, or a fancy buzzword? Do you associate it with cryptocurrencies? Have

Read More
August 08, 2017

Digital Transformation - Put Your IBM Power Systems in the Cloud

How Your Cloud Computing Solutions Provider Can Help

Cloudcomputing is a critical component of digital transformation, paving the way for new types of innovation and creativity in the lives of

Read More
January 23, 2017

Go Beyond Compliance for Your IT Security

Secure Your Information Protection with Managed Security

You have a solid IT security system in place. You are compliant with the necessary regulations and requirements and you trust in your security

Read More
1
May 22, 2018

Do You Need a SIEM for Your Security in 2018?

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a

Read More
May 08, 2018

How to Save Time and Money with Software Audit Defense

Working in the software industry can mean navigating a veritable minefield of licensed materials and products. Unexpected software audits come with the territory and can result in substantial

Read More
April 05, 2018

Nutanix on Power - Hyperconverged Infrastructure

Nutanix with IBM Power® Systems – Hyperconverged Infrastructure to Empower Your Data Centres

Read More
March 22, 2018

Blockchain on the IBM z14 Mainframe 

 

What comes to your mind when you hear the word blockchain? Do you think of it as just one of the latest technology trends, or a fancy buzzword? Do you associate it with cryptocurrencies? Have

Read More
August 08, 2017

Digital Transformation - Put Your IBM Power Systems in the Cloud

How Your Cloud Computing Solutions Provider Can Help

Cloudcomputing is a critical component of digital transformation, paving the way for new types of innovation and creativity in the lives of

Read More
January 23, 2017

Go Beyond Compliance for Your IT Security

Secure Your Information Protection with Managed Security

You have a solid IT security system in place. You are compliant with the necessary regulations and requirements and you trust in your security

Read More
1

Do You Need a SIEM for Your Security in 2018?

Posted by GlassHouse Systems on May 22, 2018 2:18:20 PM

Exploring the Benefits of SIEM

Security Information and Event Management (SIEM) is a marriage of Security Information Management (SIM) and Security Event Management (SEM) designed to provide a technological bird’s eye view of potential security issues within a company. The SIEM system works by gathering flow data from all relevant areas and establishing normal patterns of use. It can then identify and alert the company to any abnormal activities that can indicate a breach of security. 

Read More

Topics: compliance, cyber security, endpoint, ibm, information protection, IT security, managed security, managed services, MSSP, online security, perimeter, phishing, qradar, ransomware, risk, Security, threats, Cognitive Security, email scams, hacking, cyber attacks, data breach, Managed Security Services, SIEM

How to Save Time and Money with Software Audit Defense

Posted by GlassHouse Systems on May 8, 2018 2:38:10 PM

Working in the software industry can mean navigating a veritable minefield of licensed materials and products. Unexpected software audits come with the territory and can result in substantial financial losses. An audit is designed to discover companies that are working with unlicensed materials. This isn’t always a result of piracy, but sometimes happens when licenses are incomplete or simply outdated.

Read More

Topics: ibm, SAM, software asset management, audit, ILMT, software audit defense

Nutanix on Power - Hyperconverged Infrastructure

Posted by GlassHouse Systems on Apr 5, 2018 2:34:43 PM

Nutanix with IBM Power® Systems – Hyperconverged Infrastructure to Empower Your Data Centres

Read More

Topics: cloud computing, ibm, power, Private Cloud, cloud, hyperconvergence, nutanix, hci

Blockchain on the IBM z14 Mainframe 

Posted by GlassHouse Systems on Mar 22, 2018 12:12:27 PM

 

What comes to your mind when you hear the word blockchain? Do you think of it as just one of the latest technology trends, or a fancy buzzword? Do you associate it with cryptocurrencies? Have you considered that it may be a technology that has the power to revolutionize the way businesses and entire industries operate?

Read More

Topics: ibm, blockchain, system z, mainframe, z/OS, z systems, linux on z

Digital Transformation - Put Your IBM Power Systems in the Cloud

Posted by GlassHouse Systems on Aug 8, 2017 9:56:34 AM

How Your Cloud Computing Solutions Provider Can Help

Cloudcomputing is a critical component of digital transformation, paving the way for new types of innovation and creativity in the lives of consumers and businesses who use it. Users who have depended upon the robust and reliable IBM Power Systems are now looking to migrate to the Cloud in a bid to grow independently as a business and distinguish their company from industry competitors.

Read More

Topics: cloud computing, ibm, Cloud Migration

Go Beyond Compliance for Your IT Security

Posted by GlassHouse Systems on Jan 23, 2017 12:10:25 PM
Secure Your Information Protection with Managed Security

You have a solid IT security system in place. You are compliant with the necessary regulations and requirements and you trust in your security provider.

Read More

Topics: compliance, cyber security, endpoint, exfiltration, guardium, ibm, information protection, IT security, logs, managed security, mdm, perimeter, phishing, qradar, Security, threats, bigfix