Archive

Search Blog

photo

Infographic: How Intel’s Transparent Supply Chain Reduces Hardware Security Risks

Posted on May 25, 2016 0 comments

Increasingly, enterprises are demanding hardware sourcing authentication as a way to prevent counterfeit components from creating vulnerabilities within networks or systems. Incidents like the recent revelation that Apple may have purchased compromised motherboards are the reason that sourcing information and verification of supply chain integrity are becoming mandatory for certain contracts.  Read More

photo

Security of IoT: Issues and Solutions

Posted on May 24, 2016 0 comments
Category: Internet of Things

Any ISV considering IoT solutions or an enterprise wanting to take advantage of IoT solutions must be acutely aware that security is a fundamental piece of the solution. Not only could a potential exploit hurt product functionality and damage brand reputation, but it could also introduce network vulnerabilities to other connected server systems.  Read More

photo

Intel’s “Tick-Tock” Model Changes as Node Cycles Stretch

Posted on April 29, 2016 0 comments

In what many saw as the inevitable, Intel announced changes to their formalized 12-month tick-tock cycle a few weeks ago. Intel has simply decided optimizing the current architecture with new features is a more judicious use of time than trying to overcome the financial and physical barriers of shrinking the manufacturing process further.  Read More

photo

How Your Business Can Take Advantage of the Internet of Things

Posted on April 22, 2016 0 comments

Over the past few years, adoption of sensor networking technology — known colloquially as “the Internet of Things” or IoT — has grown tremendously. According to Gartner research, 29-percent of major organizations are currently using IoT technology. An additional 35-percent plan to implement it within the next 12 months, or soon after.  Read More

photo

Lifecycle Management Expertise to Reduce Risks and Hit Cost and Revenue Goals

Posted on March 11, 2016 0 comments

Partnering with an established value-added system integrator and deployment solutions provider can allow ISVs to avoid risks associated with their product’s lifecycle management. By anticipating problems during the design phase and providing long-term support once the product has shipped, overall costs are reduced, revenue pricing models are more reflective of lifecycle costs and customers become more satisfied overall. Even when the product nears the end of its useful lifespan, intelligent lifecycle management can mean timely replacement of obsolete systems with minimal downtimes.  Read More

photo

Here’s What We Learned at RSA 2016

Posted on March 10, 2016 0 comments

We just came back from an exhilarating five days at the RSA 2016 Conference in sunny, beautiful San Francisco, California. While there, we heard some of the most recent news in the information security industry. We also heard from thought leaders on such diverse subjects as the right to encryption, the relationship between privacy and government, and the possible evolution of software defined security practices.  Read More