Author user photo

Closing the Human Behavior Gap in IT Security Monitoring

Gaby Friedlander, Co-Founder and CTO - ObserveIT

User activity monitoring software provides protection from threats that come from within an organization and contracted vendors with malevolent intentions.

Author user photo

The New Odd Couple: Five Steps to Ensure Internal Zen with CMO and CIO

Kim DeCarlis, Chief Marketing Officer - BMC

In a typical enterprise organization, the CIO and CMO live at opposite ends of the spectrum, but this is changing. Here’s advice for achieving a complementary and mutually beneficial relationship.

Author user photo

Four Keys to Disruptive Innovation in the $3 Trillion Market for Enterprise Technology

Kathleen Goolsby, Managing Editor -

It’s difficult for software startups and established companies to upend market leaders. Here are the essential components enabling one company to succeed with disruptive innovation.

Author user photo

Tips for Enterprise Application Integration

Roman Kropyvnytskyy, IT Consultant - SoftServe Inc.

A need for Enterprise Application Integration is increasing due to the growing share of standardized solutions implementation. Here are the top five causes of failure along with ways to increase the chances for EAI success.

Author user photo

Real-Time Solution to Enterprise Mobile Information Security: Information Rights Management

Vishal Gupta, CEO - Seclore

When it comes to implementing enterprise security, it is possible to take extreme steps that could cause more harm to employees and in turn the whole enterprise.