237本のエピソード

The On-Premise IT Roundtable gathers the best independent enterprise IT voices, puts them around a table, and gets them talking around a single topic. It breaks the traditional IT silos, taking on topics from across the isolated realms of servers, networking, storage, cloud, and mobility.

The On-Premise IT Roundtable Gestalt IT

    • ニュース

The On-Premise IT Roundtable gathers the best independent enterprise IT voices, puts them around a table, and gets them talking around a single topic. It breaks the traditional IT silos, taking on topics from across the isolated realms of servers, networking, storage, cloud, and mobility.

    Identity Management is Tweaking our Neuroses

    Identity Management is Tweaking our Neuroses

    The concept of identity management has become increasingly complex and challenging due to the purely digital nature of modern identity. This episode of the On-Premise IT podcast, recorded on-premises at ISS in Cleveland, features Bob Kalka of IBM, Leon Adato of Kentik, and Stephen Foskett discussing the various ways identity management tweaks our neuroses. As organizations grapple with this issue, they face the daunting task of merging elements such as identity, passkeys, passwords, and AI in a way that is seamless and less nerve-wracking.















    Identity Management is Tweaking our Neuroses







    The relevance of identity and self goes beyond what we normally comprehend in our routine lives. Within virtual spaces, identity management becomes even more important because it is disconnected from our physical experience. From the lens of the cybersecurity team, taking control of identity management presents unique challenges as they neither completely own the problem nor the solution. Legacy systems and constantly shifting tools create further hurdles in the management of identity and access permissions, often making it appear more like security theatre.







    However, the necessity to ward off unauthorized access necessitates an efficient system of identity management. Many are suggesting that AI can break through these challenges. In particular, AI aids in the detection of identity-related threats by analyzing behavioral patterns. As a result, it helps to deal with the attendant neuroses related to identity management found in many digital users.







    The concept of identity management is increasingly being viewed as a fabric of relationships rather than a singular goal. The identity fabric acknowledges the realities of a hybrid world where managing identity across multiple identity providers and directories is an essential function. Passwordless authentication, a user-friendly concept leveraging passkeys, has recently emerged as a popular solution. But the process of identity management does not halt with user access. The backend still necessitates managing identities in multiple locations. Responding to this need, the concept of identity orchestration has emerged as a novel approach in managing identity in varied environments. Taking ownership and addressing these challenges proactively is an essential step in effectively managing identity.







    The complexity of digital identity management underlines the necessity for organizations to accept the reality of these management hurdles. Leveraging advancements such as AI to shed light on the issue in a more comprehensive manner is a critical stride towards finding more effective solutions. Recognizing and understanding the shortcomings of these systems is vital in this journey, just as it is crucial to appreciate the potential of AI in steering breakthroughs in the digital identity management space.















    Podcast Information









    * Stephen Foskett is the Publisher of Gestalt IT and Organizer of Tech Field Day. Find Stephen’s writing at GestaltIT.com and connect with him on LinkedIn and on Twitter at @SFoskett. 







    * Leon Adato is the Principle Technical Evangelist at Kentik. You can connect with Leon a href="https://www.linkedin.

    • 27分
    Cybersecurity is a C-Suite Problem

    Cybersecurity is a C-Suite Problem

    As ransomware continues to pose a significant threat to enterprises, C-level executives must collaborate and communicate with IT. This episode of the On-Premise IT podcast, brought to you by Commvault and recorded live in New York at their Shift event, features Thomas Bryant of Commvault along with Gina Rosenthal, Eric Wright, and Stephen Foskett. The discussion focused on the crucial need to bridge departmental gaps so IT and executive management can work together. The panel also emphasized the need for openness about risks, lessons from past attacks and the role of government mandates.















    Cybersecurity is a C-Suite Problem







    Ransomware is increasingly becoming a significant issue demanding the attention of C-level executives. As discussed on the On-Premise IT podcast recorded live at Commvault Shift, tackling cyber risks is not just a technical challenge but also one of leadership and governance. Commvault’s focus on cyber resilience brought to light the crucial role of CEO, CIO, and board involvement in addressing such threats. With government mandates pushing for greater accountability within organizations, the responsibility for cybersecurity now extends far beyond the domain of IT and security teams.







    A key aspect highlighted throughout the discussion was the importance of collaboration between different departments within an organization such as security, networking, and IT operations. This cross-functional collaboration is seen as a critical factor in addressing cyber threats effectively. To facilitate such collaboration, the democratization of information flow is needed. Breaking down departmental silos and fostering free-flowing communication can aid in the rapid identification, reporting, and addressing of potential threats.







    The shifting paradigm within cybersecurity, from solely focusing on prevention to minimizing damage in case of an attack, also came under discussion. The panel recognized that with the evolution and complexity of cyber threats, a strategy focusing only on prevention may be inadequate in protecting assets. This understanding calls for the regular testing and practicing of incident response plans, critical for building “muscle memory” and reducing potential downtime and lost revenue from cyber attacks.







    In discussing the SolarWinds case, where the CISO faced criminal prosecution after a cyberattack, the podcast panel underscored the importance of transparency and honesty in cybersecurity. This precedent sets an example for other organizations, emphasizing that surviving an attack should not be a source of shame, but instead, should be an opportunity to learn and enhance security measures. The critical role of government regulations, resulting fines, and the potential incentivization of good cybersecurity practices through monetary means were also discussed as drivers of better cybersecurity practices.







    Finally, the panel discussed Commvault’s new platform, marrying expert knowledge with proactive measures such as ransomware assessments to aid organizations in enhancing their cybersecurity practices. This approach signifies the industry’s movement away from its “wizards” culture, acknowledging vulnerabilities, and working towards admitting and addressing challenges. In essence, the cybersecurity landscape is one of shared responsibility, transparency, proactive measures, government backing, and technological advancements.















    Podcast Information









    * Stephen Foskett is the Publisher of Gestalt IT and Organizer of Tech Field Day. Find Stephen’s writing at a href="https://gestaltit.

    • 26分
    You Are Afraid of the Vendor Switch

    You Are Afraid of the Vendor Switch

    Changing or upgrading hardware and software is a scary proposition on the best of days. In this episode, join Tom Hollingsworth along with Keith Parsons, Mike Bolitho, and Lee Badman as they talk about moving from one vendor to another. There is a lot of planning that goes into the decision to upgrade or replace something. It’s even more frightening when you’re removing one vendor’s equipment for another. Learn what to look for and how to make the transition as easy as possible.







    Podcast Information









    * Tom Hollingsworth is a Networking and Security Specialist at Gestalt IT and Event Lead for Tech Field Day. You can connect with Tom on LinkedIn and X/Twitter. Find out more on his blog or on the Tech Field Day website.







    * Keith Parsons is the Managing Director at Wireless LAN Professionals Conference and a long time Field Day Delegate. You can connect with Keith on LinkedIn and on X/Twitter, or visit the WLANPros website to learn more.







    * Lee Badman is a longtime freelance writer and analyst as well as contributed to and written a number of wireless study guides. You can connect with Lee on LinkedIn or on X/Twitter and find his writings on his blog.







    * Mike Bolitho is a wireless network engineer for a national hospital system. You can connect with Mike on LinkedIn or on X/Twitter.









    Follow us on Twitter! AND SUBSCRIBE to our newsletter for more great coverage right in your inbox.

    • 28分
    Edge is the Third Great Tech Revolution

    Edge is the Third Great Tech Revolution

    Tech is a field full of revolutions and Edge is something special. In this episode of the On-Premise IT Podcast, Jim Czuprynski, Gina Rosenthal, and Brian Knudtson give their take on whether or not Edge is a fundamental shift in the status quo or mearly an evolution of other paradigm shifts like Cloud. The panel focuses on the way that Edge strategies are affecting the way we consume content and deploy applications as well as the impacts that Edge has on areas outside of technology.



















    Podcast Information









    * Tom Hollingsworth is a Networking and Security Specialist at Gestalt IT and Event Lead for Tech Field Day. You can connect with Tom on LinkedIn and X/Twitter. Find out more on his blog or on the Tech Field Day website.







    * Jim Czuprynski, Oracle DBA and Oracle ACE Director. You can connect with Jim on LinkedIn and on Mastodon, and learn more about him on his website.







    * Gina Rosenthal, Founder and CEO of Digital Sunshine Solutions. You can connect with Gina on LinkedIn and listen to her podcast, The Tech Aunties Podcast. Learn more on her website.







    * Brian Knudtson, multi-disciplinary technologist and freelance writer. You can connect with Brian on LinkedIn or on Mastodon and read more on his work on his blog.

















    Follow us on Twitter! AND SUBSCRIBE to our newsletter for more great coverage right in your inbox.

    • 25分
    Licensing is Ruining Networking

    Licensing is Ruining Networking

    Software licensing is making networking much more complex and causing networking professionals to be very confused about the state of their discipline. In this episode, Tom Hollingsworth is joined by Nick Buraglio and Lindsay Hill as they discuss the way that software defined networking (SDN) has changed the feature set of network hardware. Also discussed is the shift in focus to developer assets as well as how to recognize revenue from incremental feature additions as well as deployment of resources to appropriate functions in a network software development company.



















    Podcast Information









    * Tom Hollingsworth is a Networking and Security Specialist at Gestalt IT and Event Lead for Tech Field Day. You can connect with Tom on LinkedIn and X/Twitter. Find out more on his blog or on the Tech Field Day website.







    * Nick Buraglio is currently works on the network planning and architecture team for a major international research network. You can connect with Nick on X/Twitter and on LinkedIn and check out his website at the Forwarding Plane.







    * Lindsay Hill is a networking engineer at a major video game publisher. You can connect with Lindsay on LinkedIn and on X/Twitter or read more on his Website.

















    Follow us on Twitter! AND SUBSCRIBE to our newsletter for more great coverage right in your inbox.

    • 27分
    Mind the Gap Between Hyperscale and Enterprise IT

    Mind the Gap Between Hyperscale and Enterprise IT

    Hyperscale-inspired technology is everywhere in enterprise IT, from Kubernetes to S3 to OCP, but these technologies may not be applicable. This episode of On-Premise IT features Cloud Field Day 18 delegates Allyson Klein, Eric Wright, and Nathan Bennett discussing the cloud gap with Stephen Foskett. Looking at AI, we see a very different deployment model in hyperscale cloud as opposed to enterprise cloud, with this gap in technology, implementation, and talent widening. One impact of the needs of hyperscalers is an increased focus on sustainability, specifically energy consumption. We should also consider how the hyperscale use case distorts the development of technology, which is obvious in CXL, GPUs, and networking technologies. Looking at Cloud Field Day, we see that many of these companies are attempting to bridge this gap, connecting hyperscale cloud technology to the enterprise. This is what makes the event so interesting!







    Podcast Information









    * Stephen Foskett, Publisher of Gestalt IT and Organizer of Tech Field Day. Find Stephen’s writing at GestaltIT.com and connect with him on LinkedIn and on Twitter at @SFoskett. 







    * Allyson Klein, Global Marketing and Communications Leader and Founder of The Tech Arena. You can connect with Allyson on Twitter or LinkedIn. Find out more information on the Tech Arena website.







    * Nathan Bennett, Focusing on Cloud, Automation, AI/ML, and Emerging Technologies. Connect with Nathan on LinkedIn or follow him on Twitter at @vNathanBennett.







    * Eric Wright is the Chief Content Officer at GTM Delta and is a podcast host on the Disco Posse Podcast. You can connect with hm on Twitter or LinkedIn and find out more about him on the Disco Posse Podcast website.

















    Follow us on Twitter! AND SUBSCRIBE to our newsletter for more great coverage ...

    • 35分

ニュースのトップPodcast

NHK (Japan Broadcasting Corporation)
ニッポン放送
ニッポン放送
日本経済新聞社
BBC World Service
NHK WORLD-JAPAN

その他のおすすめ

Storage Unpacked Podcast
Changelog Media
Marketplace
Virtually Speaking Podcast
Andreessen Horowitz
Packet Pushers Interactive, LLC