- Home
- Resources
Resource by Type
Cloud
10 Takeaways from Companies Who Have Migrated to Cloud
IBM i
Strategy and Roadmap Whitepaper
Get the executive guide to the strategy and roadmap for the IBM i integrated operating environment for Power Systems.
Learn how IBM i can help you transform your organization into a center for...
Cloud Services
Hybrid Cloud – What It Is, Why It Matters
As organizations attempt to strike a balance between having all IT services on-premises and offloading storage and compute to the cloud, a logical middle ground has emerged: the hybrid cloud.
This...
Security
Integrated Cybersecurity: Don’t Be the Next Ransomware Headline
Cloud
Cyverity Research Whitepaper by David Senf
Learn about the Cloud impact on IT Security in this whitepaper by David Senf, founder of Cyverity Research. Cyverity has conducted in-depth surveys and analysis to help organizations measure the...
Security
The Vulnerability Management Diagnostic Scorecard
We’ve all heard the horror stories of what can happen when a hacker infiltrates your company. In the best-case scenario, you lose money, time, and trust. In the worst-case scenario, your company may...
BaaS
Addressing Business Risk While Overcoming Enterprise Backup Complexity
Palo Alto Next Generation Firewall Promotion by GlassHouse Systems
4 Reasons to Migrate to the Cloud in 2018
Data Breaches! Inogen, Nova Scotia, and Ikea’s TaskRabbit
GlassHouse Systems – Common Cybersecurity Mistakes
In the ever-evolving landscape of computing technology, three titans stand out for accelerating tasks, especially in the realms of artificial intelligence (AI), machine learning (ML), and deep...
Software Developers and Engineers! Think you've seen it all in software development?
IBM i, running on Power Systems in the IBM Cloud supplemented by managed services, is about to expand your...
GlassHouse Systems, the leading provider of complex enterprise IT and security solutions, is proud to be Certified™ by Great Place to Work®. The prestigious award is based entirely on current...
Vulnerability Assessments versus Penetration Testing
The bartender says to an empty chair “we don’t serve time travelers here.” Moments later, a time traveler walks into the bar and sits down in the...
According to a new study from Juniper Research, the advent of 5G will cause an explosion in ubiquity and profitability for IoT devices: total operator-billed revenue is predicted to rise...
Flash storage is a storage media technology that is designed to electronically secure data. Flash technology offers users high-speed, electronically programmable memory that eliminates rotational...
The past few months have played witness to a sharp rise in cybersecurity attacks against healthcare providers. Historically speaking, the healthcare industry has lagged behind other major industries...
In a few short months, the Coronavirus (COVID-19) pandemic has forced massive change across the world. While governments are grappling with how to repair health and economic systems, cybercriminals...
Just as 2020 was getting underway, the entire world began entering various degrees of lockdown due to the spread of COVID-19. Social distancing was introduced as one of the key measures to slow down...
Ransomware gangs are aware that the best use of their resources is to target corporate networks where they can gain access to many PCs and valuable institutional data. After all, a business is more...
Business has been vastly affected by mobility, the adoption of Bring Your Own Device (BYOD) practices, the rise of the Internet of Things (IoT), and various other digital shifts. This has changed,...