Authors
Posts by Ericka Chickowski
thumbnail Ericka Chickowski

Ericka Chickowski

Content Writer
25 Facts About Rackspace

25 Facts About Rackspace Rackspace was founded in 1998 by Richard Yoo, Dirk Elmendorf and Patrick Condon when they found that the customers of an earlier ISP they founded actually needed most assistance in figuring out how to host their applications. No Title Since then, Rackspace has grown into a massive operation, bringing in $230 […]

Jun 21, 2011
Eight RSA SecurID Alternatives

Eight RSA SecurID Alternatives PhoneFactorA smartphone-based out-of-band authenticator, PhoneFactor is gunning for former SecurID customers. The company is offering up to $5 of credit per SecurID token swapped out, along with deployment assistance for customers willing to make the transition. No Title CA Arcot ID A Arcot ID is a software-based token that adds the […]

Jun 15, 2011
SecurID Breach: Customers Weigh Dumping RSA

As frustration builds from customers fed up with RSA’s handling of the SecurID breach and the deployment costs  of replacing ineffective tokens staring them in the face, many formerly loyal to the brand are considering the once unthinkable: casting RSA’s authentication products in favor of mult-factor alternatives. According to the experts, smart channel partners should […]

Jun 15, 2011
RSA SecurID Replacement: VARs Respond

RSA’s confirmation of the severity of its March data breach this week and announcement that it will replace 40 million SecurID authentication tokens as a result has left partners scrambling with many questioning the reputation of the vaunted security vendor. "Trust is the currency of business in information security," says Rick Moy, CEO of NSS […]

Jun 13, 2011
RSA to Reissue SecurID Tokens

It took nearly three months and a major security incident at one of the nation’s most critical defense contractors to spur it on, but on Monday RSA, The Security Division of EMC, finally let the cat out of the bag about the severity of a March security breach against its SecurID authentication token infrastructure.  The […]

Jun 7, 2011
Security Threat Intensifies: Lockheed, Google, DoD

Last week the threat of cyberwarfare and state-sponsored hacking activities flared up to show itself as more than just an imaginary boogeyman. The fleeting specter gained some tangibility with a number of incidents coming to light, including the details of a sophisticated attack against defense contractor Lockheed Martin, some of  its subcontractors and potentially other […]

Jun 6, 2011
How To Reduce Mobile Risks 10 Ways

How To Reduce Mobile Risks 10 Ways 1. Install on-device anti-malware to protect against malicious applications, spyware, infected SD cards and malware-based attacks to the device. No Title 2. Use on-device firewall to protect device interfaces. No Title 3. Utilize SSL VPN clients to protect data in transit and to ensure secure and appropriate network […]

Jun 6, 2011
Do IT Certifications Still Matter?

A new report from the IT employment experts at Foote Partners has found that the premium that companies pay for IT certifications are at their lowest point since 1999, while many non-certified skills remain at the top of employers’ wish list. "This is the largest gap in pay for skills and certifications in ten years," […]

Jun 3, 2011
Non Certified IT Skills Commanding Higher Pay

Non Certified IT Skills Commanding Higher Pay Systems/NetworkingLast Two Years: -4.9 percentLast Year: 5.1 percentLast Quarter: 3.2 percent No Title Messaging and CommunicationsLast Two Years: -14.3 percentLast Year: 0 percentLast Quarter: 2.8 percent No Title SAP & Enterprise Business ApplicationsLast Two Years: 3.9 percentLast Year: 1.4 percentLast Quarter: -0.3 percent No Title Apps Development Tools […]

Jun 2, 2011
Insider Attacks and Human Error Is Your Database Safe

Insider Attacks and Human Error Is Your Database Safe 56 percent of the non-financial services respondents believe that human error represents the greatest challenge or risk to database security. No Title 24 percent of non-financial services firms state that abuse of privileges is the greatest threat. No Title 77 percent of financial firms are mostly […]

Jun 2, 2011
Data backup and recovery

Data backup and recovery 39 percent Security applications 37 percent Virtualization solutions 30 percent Content management solutions 24 percent Unified communications 18 percent Cloud computing 18 percent PCs 51 percent Laptops 48 percent Servers 37 percent Printers 33 percent Operating systems 32 percent Productivity suites and software 28 percent Network infrastructure 27 percent Smartphones 23 […]

May 25, 2011
Government Budget Spending Opportunity for VARs

Even amid budget shortfalls and tightened bureaucratic belts, there remains quite a bit of opportunity for channel players catering to the government market according to the recently released CompTIA Second Annual Government IT Purchase Plans survey. “Though budget challenges and the burden of bureaucracy can slow the pace of change, government technology spending will continue, […]

May 25, 2011
Channel Insider Logo

Channel Insider combines news and technology recommendations to keep channel partners, value-added resellers, IT solution providers, MSPs, and SaaS providers informed on the changing IT landscape. These resources provide product comparisons, in-depth analysis of vendors, and interviews with subject matter experts to provide vendors with critical information for their operations.

Property of TechnologyAdvice. © 2025 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.