8:18 am, May 28, 2015

Search Result

Search Tags:  Forrester Research

Cybersecurity outsourcing expected to surge

Technology has been changing as usual, the business has been demanding more and more from security professionals as expected, and we continue to outsource some of our responsibilities.

Tags: Cybersecurity Update , Cybersecurity Workforce , Adobe , Google , outsourcing , contracting , Technology

Thursday - 01/14/2010, 09:03am EST

How to get the most for your IT dollars

President Barack Obama's 2011 budget proposal, released Monday, flattens federal IT spending and orders federal departments to consolidate and centralize IT operations.FY

Tags: FY 2011 budget , Technology , budget , OMB , White House , IT , Craig Symmons ,

Wednesday - 02/03/2010, 10:30am EST

How to consolidate federal data centers

Increasing efficiency is one of the Obama administration's top initiatives and achieving that goal relies, at least in part, to consolidating data centers. Richard Fishera with Forrester Research explains the process.

Tags: Federal Drive , OMB , Richard Fishera , Data center consolidation

Monday - 10/18/2010, 09:41am EDT

Cloud market to grow to $241B by 2020

Here’s a fun, “little” cloud computing nugget to digest this lovely Monday afternoon. In its latest report, Forrester Research estimates the global cloud computing market will grow to $241 billion by the year 2020. That’s up from $40.7 billion in 2011. According to the executive summary, the report “forecast[s] shifts in the usage patterns of [...]

Tags: BPaaS , Cloud computing , IaaS , infoTECH , PaaS , SaaS , ZDNet

Monday - 04/25/2011, 06:24pm EDT

The move to telework starts with the cloud

Before the teleworkforce can grab the iPad and go, data storage will need to hit the cloud.

Tags: Technology , Telework Center , telework , Polycom , iPad , Deloitte , Suzanne Kubota , Eric Openshaw , Jeff Bergeron , Ted Schadler ,

Monday - 02/07/2011, 04:00am EST

Know your data so you can protect it

If you don't want employees in your agency to use a USB device, you can install an agent on the laptop that'll block any communication with a USB device. It is one example of a Data Leak Prevention tool, which can help you define the data you're trying to protect from threats within your own network. But that also means you have to know exactly what data it is that you WANT to protect. Khalid Kark of Forrester Research says if you don't know, you can't define it and the DLP tools can't work.

Tags: Technology , Inside Cybersecurity , Khalid Kark , Cybersecurity , Amy Morris

Thursday - 09/02/2010, 04:03pm EDT

Network-centric tools help guard against internal threats

New tools can help you protect your network from the threat within. Khalid Kark of Forrester Research says there's a set of tools that are considered "network-centric," that will record all the network sessions. That allows cyber sleuths to replay the sessions and find out where any breaches or intrusions are coming from - in house. There are also "data leak prevention" tools you can use that'll allow you to create your own parameters that'll block that information from leaving your network.

Tags: Technology , Inside Cybersecurity , Cybersecurity , CA Technologies , Khalid Kark , Amy Morris

Thursday - 09/02/2010, 03:57pm EDT

Navigating the sea of mobile devices

Which mobile devices have what your agency needs? And how can you decide?

Tags: Federal Drive , Technology , Mobile devices , Brownlee Thomas , Vyomika Jairam

Monday - 08/30/2010, 09:31am EDT

One answer to the new threats

This week, host Tom Temin talks with Khalid Kark of Forrester Research.
Aug. 26, 2010

Tags: Technology , Federal Security Spotlight , Tom Temin , Khalid Kark

Tuesday - 08/24/2010, 02:47pm EDT
  • 1