Category : C2 Fall 2020

Articles C2 Fall 2020 Cybersecurity Data FBI

A Cybersecurity Sit-Down with Former FBI Computer Scientist James Morrison

Shannon Gillenwater
$10.5 trillion...with a ‘T’. That’s roughly a 75% increase from the $6 trillion that cyber criminals and hacker organizations are already costing us in 2021. Hence why cybersecurity, unpleasant a topic of conversation as it...
C2 Fall 2020

Protecting Your Most Valuable Asset Demands A New Approach To Cybersecurity

Cohesity
Today, data is likely your most valuable and vulnerable strategic asset, and yet many of the methods for storing and protecting it are decades old. Data is not only a record of what has happened;...
C2 Fall 2020

Lisa Partridge of XYPRO Technology Corporation: How We Plan To Rebuild In The Post COVID Economy

Charlie Katz
Everything that happens is ultimately my responsibility. Period. However, one cannot and should not do it all alone. No one person has all the answers and think of all the perspectives to consider when making...
C2 Fall 2020 Storage

Around The Storage Block

Calvin Zito
We spend a lot of time and energy talking about HPE Primera and HPE Nimble Storage – for good reason as I really believe they are the best one-two punch of mid-range and Tier-0 mission...
C2 Fall 2020 Editors' Picks

Five steps to transform to on-premises cloud services

Erik Vogel
Not all applications can be run in the public cloud. Here's how to get the cloud to come to you. By now, the benefits of the cloud are well known: reduced costs, improved scalability, increased...
C2 Fall 2020

Möbius Partners Success Story: Improving Cluster Management and System Updates

Kevin D. Hall
Recently Möbius Partners worked with a client who lacked high-performance computing (HPC) cluster manageability tools that resulted in non-standardized operating systems and patching inconsistencies. This customer entrusted our team to provide a solution that would...
C2 Fall 2020 Digital Transformation Education and Training

Working—and Thriving—in the Age of Digital Transformation

Hewlett Packard Enterprise
In the past decade, we’ve experienced a global acceleration of digital transformation as many things that we once did in-person are now routinely done online—communicating, shopping, dating, finding entertainment, and applying for jobs, to name...
C2 Fall 2020

End-to-End Cloud Data Security: Shouldn’t It Be a No-Brainer?

comforte
Hardly a week goes by without news of a high-profile data breach. Sometimes, the damage is quite limited either due to the low market value of the apprehended data, the strength of the data security...
C2 Fall 2020

Integrate Your HPE NonStop Servers with SailPoint Identity Governance

XYPRO Team
Whether you need to provision users on one or multiple HPE NonStop servers, XYGATE Identity Connector (XIC) elegantly integrates your NonStop servers with your SailPoint enterprise solution.  Achieve user governance, provisioning and reconciliation of HPE...