5 Reasons Why Symantec’s Acquisition Of Blue Coat Matters To The CIO’s Office

On 12 June, 2016 Symantec announced its agreement to acquire Blue Coat for USD 4.65 billion.

As a result of this acquisition, the company will now have 385,000 customers, a vast repository of data sources and over 3,000 researchers and engineers worldwide. Post this acquisition, Symantec will have USD 4.4 billion in combined revenue (on pro-forma, non-GAAP basis) in FY16. By the end of FY18, Symantec expects to realise USD 550 million in run-rate cost savings. In addition, the combined entity will have access to vast Security and Threat Intelligence data sources including Telemetry gathered from 175 million protected endpoints; more than 2 billion emails scanned per day; 1.2 billion web requests monitored per day across 55 languages; 12,000 Cloud applications monitored and controlled.

What to look for when #hiring an IT consultant

Just because someone has the words “IT consultant” printed on a business card doesn’t mean he can solve your particular technology challenge or will work well with your IT or management team. So how do you find the right IT consultant, someone who understands your business and can address your specific IT need(s)?

What to look for when hiring an IT consultant

Just because someone has the words “IT consultant” printed on a business card doesn’t mean he can solve your particular technology challenge or will work well with your IT or management team. So how do you find the right IT consultant, someone who understands your business and can address your specific IT need(s)?

Data Security – The Questions, Solutions and Do’s and Don’ts

At a recent tweet chat organized by Greyhound Research (corresponding hashtag: #SecurityChat), an esteemed group of panelists discussed ‘Security in the New IT World’. The conversation revolved around  various facets of security issues plaguing todays enterprises, particularly impact of emerging technologies like cloud, mobility, big data and social technologies. Apart from discussing the trends, the panelists also provided a certain set of do’s and don’ts, with respect to securing data, for IT leaders to follow before implementing any solution.