Ed Kimm

Author's Posts

7 Key Questions to Ask a DRaaS Provider - Featured Image

7 Key Questions to Ask a DRaaS Provider

Sleep Soundly with a Solid Disaster Recovery Solution in Place You wake up in a cold sweat during what should be a peaceful night’s sleep – your white noise machine sings sweet lullabies of waves crashing on the shore; the temperature in your room is a crisp 65 degrees. But your mind is racing, and you just know something’s amiss.
Why Companies Are Choosing to Outsource Their NOC - Featured Image

Why Companies Are Choosing to Outsource Their NOC

For most businesses, the success of your company depends heavily on your network and IT systems operating properly. To ensure stability, functionality, and security, it’s critical to have a highly capable resource continuously monitoring your systems, 365 x 24 x 7.  Outsourcing NOC (Network Operation Centers) can help organizations of all sizes to monitor, measure, secure, and analyze their mission critical data, along with supporting micro-services, managing the network, and more efficiently run business applications.
How Businesses Develop a Viable Blockchain Strategy - Featured Image

How Businesses Develop a Viable Blockchain Strategy

You've probably seen many articles about the future of blockchain technology and how it's going to change the Internet. That's great for the Internet, but how are companies determining if this technology would help improve their business processes?
Blockchain Tackles Gaming and Enterprise Gamification - Featured Image

Blockchain Tackles Gaming and Enterprise Gamification

In a previous blog post, we explored how blockchain, a distributed ledger technology, is revolutionizing our lives. Just as the internet was a game-changer 50 years ago, blockchain is up-ending the way we do business, and not just as the underpinnings for cryptocurrencies in the financial industry. We’ve seen innovative uses for blockchain in healthcare, agriculture, shipping – and now gaming.
The CIO (R)evolution - Featured Image

The CIO (R)evolution

There’s been a rapid upheaval in corporate America, with some job titles disappearing entirely and new ones rising to the top of organizational charts. In my opinion, the job description of a Chief Information Officer has potentially changed the most. In fact, a number of people argue that the position is obsolete, particularly with the advent of BYOD and personal applications, platforms like Salesforce.com and the use of offsite servers.
Blockchain Panel Discussion - Video - Featured Image

Blockchain Panel Discussion - Video

Everyone's talking about blockchain’s untapped potential. Its touted benefits may include lower cost, risk, and capital requirements, faster transactions, more transparency and reliability, improved privacy, and unparalleled security, to name a few.
The Rise of CASBs - Featured Image

The Rise of CASBs

Late last year, industry analyst group Gartner issued a report on the market for Cloud Access Security Brokers (CASB), a software service that’s not yet widely understood. The report included a startling statistic: by 2020, Gartner predicts that 60 percent of large enterprises will use a CASB to govern cloud services. Today, we’re at just over 10 percent usage.
Introducing Blockchain-as-a-Service – and Why You Should Care - Featured Image

Introducing Blockchain-as-a-Service – and Why You Should Care

Blockchain is one of the most ingenious inventions of the last decade. The underpinning technology for digital currencies, blockchain is a methodology for enabling, recording and reconciling transactions across a completely transparent, ultra-secure distributed digital ledger. While its origins are rooted in the world of finance, blockchain technology has the potential to revolutionize the way we conduct business in industries ranging from healthcare to shipping and more.
GDPR Compliance in the Cloud - Featured Image

GDPR Compliance in the Cloud

In a previous GDPR series we discussed who is subject to GDPR guidelines, security requirements, tips for preparing, and penalties associated. To keep going with this series, we partnered with one of our partners, UnifyCloud, to speak to GDPR compliance in the cloud. If you are in the midst of moving to the cloud or already have some applications or workloads in the cloud (SaaS, IaaS, PaaaS, etc.), we put together a web recording to address concerns around ensuring GDPR compliance when it comes to XaaS services and third-party CSPs such as AWS and Azure.
How Artificial Intelligence Can Help Detect Cyberthreats - Featured Image

How Artificial Intelligence Can Help Detect Cyberthreats

Over the past few years it’s become clear that the fortress mentality of securing the perimeter and hardening the system is not effective in today’s cyberthreat environment. Even if you add in patching all your software, and randomize passwords, bad actors are going to get past your heavily guarded gate and into your network.
Data Security Challenges for Healthcare Providers - Featured Image

Data Security Challenges for Healthcare Providers

Cybercriminals have their sites on healthcare data. See tips for how to protect this sensitive information. It’s an understatement to say that data security is critical in healthcare, where a breach can not only impact an organization’s effectiveness and reputation but also affect patient privacy and—worst-case scenario—health and safety.
Cybersecurity Challenges Companies Face in an IoT World - Featured Image

Cybersecurity Challenges Companies Face in an IoT World

Protect your company's assets in a world that's increasingly dominated by mobile technology and IoT According to Computer World, there will be more than 25 billion connected online devices by 2020. IBM states that roughly 785 Cloud apps are in use for the average Enterprise while only 60 of those are actually used on a consistent basis. What does this all mean?