Skip the navigation

Consumerization of IT White Papers

Consumerization of IT white papers and technology resources for implementing and optimizing Consumerization of IT strategy, solutions, Consumerization of IT products, and more.

Ponemon 2014 SSH Security Vulnerability Report

Secure shell (SSH) keys are among the fundamental security controls enterprises rely on to protect data and ensure trust. According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations vulnerable to attacks.

Sponsor: Venafi


 

QA Automation: Reducing Test Execution While Improving Coverage

A leading capital investment firm in the US was in need of a comprehensive, cost effective and flexible solution to reduce their existing manual testing efforts. The client was carrying out the manual regression testing on their web based investment services. The primary concern was to reduce the manual testing efforts with minimal time and effort to fulfill service requests.

Sponsor: Synechron


 

EMC IT - Leading the Transformation

EMC IT - Leading the Transformation -EMC's IT organization continues on their own journey to cloud computing. Today, they are experiencing the improved agility and productivity of IT-as-a-Service (ITaaS). By sharing their experience, EMC offers valuable insight to organizations that may have a vision for such a transformation but are struggling with what steps to take and what results to expect.

Sponsor: EMC Corporation