Year: 2016
-
Beyond Passwords: Seeking Authentication Options
Categories: SecurityPassword problems Beyond Passwords: Seeking Authentication Options IT security professionals, ready to move beyond traditional passwords, are interested in authentication alternatives, a new study suggests. Plans to Increase IT Security Budget While 95% said they will increase IT security spending this year, 44% said that increase would be more than 20%. Number of Breaches in… Read more
-
Hortonworks Readies New Partner Program
Categories: News and TrendsHortonworks to Launch New Partner Program Hortonworks is set to launch its new global partner program in early February. The program, Hortonworks Partnerworks, gives partners access to and support from Hortonworks’ open-source technology experts and go-to-market capabilities. It also offers new and more extensive training, deep technical resources and new certifications. The partner program is… Read more
-
12 Important Facts About Insider Security Threats
Categories: SecurityInsider threats 12 Important Facts About Insider Security Threats Insiders and third-party collaborators account for more than four out of 10 cyber-security incidents, a new report from Aite Group shows. Four Types of Insider Threats Insider threats evolve around intellectual property theft, IT sabotage, fraud and accidents as the result of human error. Who’s at… Read more
-
Reading the Tea Leaves for IoT Solution Providers
Categories: NetworkingCisco executives expect the Internet of things (IoT) to be a $19 trillion opportunity by 2020. They also call it the Internet of everything. McKinsey projects that IoT will be as much as a $33 trillion opportunity by the year 2025. AT&T, Intel, Cisco, GE and IBM call it the Industrial Internet Numbers and names… Read more
-
Juniper Networks Ups Focus on Channel Fundamentals
Categories: Tech CompaniesTime and the IT industry have witnessed the emergence of a company that consistently delivers innovative technology, only to see that vendor continually place a distant second or even third against competitors in a particular category. Nowhere does that scenario play out more than in the networking infrastructure segment dominated by Cisco. Network infrastructure provider… Read more
-
Get Ready for the Rise of Reactive Systems
Categories: Tech AnalysisIT architecture Get Ready for the Rise of Reactive Systems A new survey points to the rapid adoption of modern applications based on reactive system architectures. Importance of Reactive Computing While 40% of the respondent described reactive computing as “totally important,” 43% said it is gaining momentum. Reactive Computing Outlook Respondents believe that 70% of… Read more