Journey through Enterprise IT Services
In Journey through Enterprise IT Services, Nadhan, HP Distinguished Technologist, explores the IT Services industry, and discusses technology trends in simplified terms.

Outpacing the market by innovating for success at HP Discover

Chris Moyer, CTO and Fellow and John McGuire, Senior VP, Global Sales from HP Enterprise Services addressed two questions in a track session at HP Discover in Frankfurt: Can your IT outpace the market? How to innovate for success? To reinforce their answers, they made market observations and used actual examples of how HP customers used Cloud, Information Optimization, and Security solutions to address situations in their own enterprises.

Information Security begins at home with your employees

Is your business protected against information security risks? HP expert Ken Larson points out five key information security management objectives for enterprises. One of these objectives – accessibility –stands out for me. In today's world of bringing your own devices, an ecosystem has been created that raises concerns about the security of the data exchanged in the process. Accessibility is a concern both from the standpoint of retrieval as well as dispatch of information. The right consumers must have the authorization to access the information and the information must be sent to the right consumers. This gets magnified when you consider the myriad possibilities with employees working out of their home office in addition to using their BYODs. Therefore, Information Security begins at home with your employee. Let us see why.

Inception of OODA loop into the security hacker’s mind

The OODA loop (recurring cycle of observe-orient-decide-act) has become an important concept in both business and military strategy. Individuals and organizations who process this cycle quickly, observing and reacting to unfolding events more rapidly than an opponent, can thereby "get inside" the opponent's decision cycle and gain the advantage. This is not too different from the plot of the movie Inception where a thief commits corporate espionage by infiltrating the subconscious of his targets. Such concepts lead me to conclude that it would be possible to think ahead of the security hackers and be prepared for the next virus so that we have the measures in place even before the virus sees the light of day.

Showing results for 
Search instead for 
Do you mean 
Follow Us

About the Author(s)
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.