Michael Pastore

6 Steps to Effective Incident Response

Organizations today are under constant cybersecurity attack. It’s only a matter of time before someone in your organization reports an incident that could jeopardize your company—and your customers. What do you do? Who needs to know? How do you proceed? These questions should all be answered before a real incident takes place, and your responses […]

The State of Enterprise Encryption and How to Improve It

July 25, 2019, 1 pm ET / 10 am PT, then available on-demand Just about everyone involved in business collaborates on a daily basis, and they do so using any number of tools. We have tools to help us exchange knowledge internally and externally, share documents and data, help groups collaborate, and fill knowledge gaps. […]

How Tri-Counties Regional Center Secures Sensitive Files and Maintains HIPAA ComplianceNew article

Guided by a “human-centered” principle, there is nothing more critical to Tri-Counties Regional Center (TCRC), than protecting and promoting the lives of those with developmental disabilities. That is why TCRC proactively secures Personal Health Information (PHI) to protect the people behind that information. Critical to this initiative was the ability to secure sensitive information shared […]

Extend Your Operational Analytics Beyond IT and Improve Your Business Outcomes

Operational analytics are of vital importance to IT organizations today. With complex hybrid infrastructures and dynamic workloads commonplace in many businesses, the ability to monitor important metrics like application performance require a level automation and analysis that can quickly turn data into useful information for your IT team. For modern analytics-driven organizations, the data generated […]

Upgrade Options for SQL Server 2008 /R2 End-of-Service

This webcast will begin by covering some of today’s pressing data platform requirements. Then we will discuss the need to upgrade from SQL Server 2008/R2 which is nearing the end of Microsoft’s extended service period. We’ll cover some of the reasons that business are slow to upgrade from older releases of SQL Server as well […]

Making the Move from AV to EPP

AV and NGAV have built upon the idea of stopping known problems (or at least known unknowns). With a foundation of signatures and a light framework of behaviors of observed attacks, they tout a way to stop attacks. However, a simple glance at the news shows these tools are not successful. Businesses need more to […]

Predictive Security: How to get off the Reactive Merry-Go-Round

Over the last few years, cybercriminals have been forced to evolve their tactics in response to the emergence of advanced protection techniques that have hindered the effectiveness of “off the shelf” commodity malware. This has driven low-skill cybercriminals to the sidelines and forced the most adept among them to step up their game in order […]

How Identity Analytics Can Help You Better Understand Access Risks

Today’s IT environments have become so complex that it’s nearly impossible to gather, analyze and detect every relevant access-related risk factor. This lack of insight is leading to security risks, operational inefficiencies, loss of data and failure to comply with regulation. With millions of entitlements to manage across thousands of users and hundreds of applications, […]

The Data Center as a Business Enabler: Everything a C-Level Should Know

As a seasoned executive, you’ve witnessed the progression of the enterprise data center from a support function – providing employees with the tools they need to work – to a business enabler that provides instant access to data that is critical to your business and a positive digital experience for your customers. Getting your data […]

Hitting Refresh with HCI for Better Performance and Less Complexity

In this session, we will explore why VMware vSAN – the industry’s leading software for HCI – is the critical first step for building a digital foundation that empowers businesses to simplify their operations by providing common operating models regardless of the underlying hardware, extending from the edge to the core to the cloud. VMware […]