Time & Attendance

June 01, 2020 Acronis Cyber Protect Cloud Turns Managed Service Providers Into Managed Security Providers

More than ever, cybersecurity solutions are core to any MSPs offering. No longer should technology service providers be farming this out to dedicated security providers. Trust and peace of mind are the core tenets of what they are selling and solutions like Acronis Cyber Protect Cloud can provide the platform upon which to deliver on those promises.

May 29, 2020 PHEMI: A Data Privacy Tool for Healthcare Providers

PHEMI is a data privacy solution focused on keeping data-processing activities secure by redacting information based on the role of the accessor. Thus, allowing such data to be used for multiple use cases without compromising privacy.

May 27, 2020 Kenna Security Offers Vulnerability Management Options: Kenna.VM & Kenna.VI

Kenna Security deployed their new data driven vulnerability management program, Kenna.VM and accessory program, Kenna.VI. Released on April 28th, Kenna.VM was created with the purpose to set service-level agreements (SLAs) with risk tolerance in mind.

May 27, 2020 What Is Emotion AI and Why Should You Care?

Recently I attended the inaugural Emotion AI conference, organized by Seth Grimes, a leading analyst and business consultant in the areas of natural language processing, text analytics, sentiment analysis, and their business applications. So, what is emotion AI, why is it relevant, and what do you need to know about it?

May 25, 2020 SLOs in Site Reliability Engineering

Thor, the Norse God of Thunder, tells Jane Foster, the woman he’s trying to impress, that on his home world of Asgard, the realm eternal, science and magic are two sides of the same coin. Had Jane been a part of the operations teams at Google (or other mature online service providers), she would have immediately realized we have a similar technology right here on good old Earth. We call the science site reliability engineering (SRE), and service level objectives (SLO) is the magic behind it. SRE is a powerful concept for organizations that are serious about keeping their customers happy. It is therefore important for them to develop well-thought-out SLOs and make certain that management is intellectually equipped to derive valuable business perspectives from them.

May 25, 2020 Site Reliability Engineering: What Is It? Why Is It Important for Online Businesses?

Hell hath no fury like a customer not being able to access an online service when they want to. They expect the online services to always be on, always be accessible, and always treat them like there’s no one else in the world who matters more. Thank heavens then for giving these online services the ability to use site reliability engineering (SRE) to keep their customers happy, engaged, and most importantly, feeling valued.

May 22, 2020 New York State Leads the Charge in Upcoming Zoom Security Enhancements

The Office of the Attorney General of the State of New York has reached a settlement with Zoom Video Communications. The agreement promises enhanced data security and user controls.

May 22, 2020 Verizon Acquires BlueJeans for $400-500 Million

Verizon has acquired BlueJeans for between $400-500 million. The move will see BlueJeans integrated into Verizon’s 5G plans, utilizing BlueJeans' advanced and encrypted video-conferencing solutions for telehealth, eLearning, and field service work.

May 20, 2020 monday.com Is Focused on User Adoption As WFH Continues

Adoption is one of the biggest challenges that organizations deal with when implementing commercial project management tools. Amid a global pandemic, this challenge has only been exasperated with many working from home.

May 20, 2020 Build a Visual Product Roadmap to Increase Agreement and Alignment

If an image is worth a thousand words, a visual roadmap will save you a thousand hours.

May 19, 2020 Choose a Right-Sized Contact Center Solution

Exploring the vendor landscape for contact center solutions is complicated, with a variety of metrics to consider within a service level agreement. This note helps narrow down which key requirements and key metrics you need to consider when choosing a contact center.

May 14, 2020 IBM Blockchain’s Shift Toward Red Hat OpenShift Bodes Well for Enterprise Blockchain Community

The latest iteration of the IBM Blockchain platform is now integrating with Red Hat OpenShift, which bodes well for the enterprise blockchain community. Red Hat OpenShift is an open-source Kubernetes platform that simplifies the orchestration and management of containers, which should be attractive to developers in the blockchain movement.

May 14, 2020 Prove the Value of Enterprise Architecture With SMART KPIs

This note outlines some of the fundamental KPIs that you should measure to show the success of the enterprise architecture team. It also discusses how you measure them and visualize the result.

May 13, 2020 Workiva and CFGI to Collaborate in the SOX and GRC Space

“Connected reporting capabilities, control testing, real-time collaboration, cloud-based access, stringent security measure and permissions controls” are considered the leading factors behind CFGI offering Workiva to its clients.

May 12, 2020 Board International Solution Marketplace Gets SOC Compliance: Prêt-à-Porter Solutions and Assured Security in the Cloud

Board International follows the trend of delivering solutions by opening a solution marketplace while strengthening customer trust by getting SOC-2 and SOC-3 certifications.

May 12, 2020 The Many Flavors of Application Rationalization

The application portfolio management (APM) tool space can be a confusing one, as many software vendors offer their own take of what APM is. Enterprise architecture, application management and project portfolio management tools offer an APM use case, but these are often quite skewed the primary function of the tool.

May 11, 2020 StorMagic – The Magic Bullet for Key Management?

With its announcement of SvKMS, StorMagic, known for leading-edge storage solutions, has officially entered the security marketplace. SvKMS provides key management for any application that requires encryption in any location – edge, datacenter, or cloud – the proverbial magic bullet for KMS.

May 11, 2020 Rapid7 Penetration Tests Show That Businesses Are Getting Better at Network Security

We often hear that businesses are continually cyber insecure or under attack. However, recent penetration testing from Rapid7 shows that businesses are getting better at securing their networks against cyberattacks. While organizations continue to have exploitable weaknesses, attackers are having greater difficulty penetrating deeper into businesses’ networks.

May 08, 2020 Application Rationalization During M&A

Application rationalization fails when the chosen framework does not match your scenario or the goals for your application portfolio. This note looks at how to apply application rationalization during an M&A.

May 07, 2020 What Is the Role of the PM/PMO on Agile Projects?

Info-Tech members moving to Agile are frequently unsure of the role of PMs and the PMO in an Agile environment. Any organization used to traditional (Waterfall) project management will need to make adjustments in support of Agile or risk losing the benefits.

May 05, 2020 Application Rationalization Oversimplified

Often people misidentify the purpose of application rationalization, leading to misuse and unsatisfactory results. We try to break application rationalization down to its simplest form to understand how to make the most of this critical IT function. tr