And There You Have IT!-logo

And There You Have IT!

Technology Podcasts >

Is your organization agile and secure enough to survive? Join Cherie Dost, former Chicago Public Radio host, as she chats with industry leaders about information technology trends and their impact on people, business, and our world. From IT security to cloud technology, learn how your business can not only survive, but thrive.

Is your organization agile and secure enough to survive? Join Cherie Dost, former Chicago Public Radio host, as she chats with industry leaders about information technology trends and their impact on people, business, and our world. From IT security to cloud technology, learn how your business can not only survive, but thrive.
More Information


United States


Is your organization agile and secure enough to survive? Join Cherie Dost, former Chicago Public Radio host, as she chats with industry leaders about information technology trends and their impact on people, business, and our world. From IT security to cloud technology, learn how your business can not only survive, but thrive.




3 Keys to Web Application Security

Web applications are under siege as hackers work around the clock to identify weak spots and steal data. Last year’s Equifax data breach put a spotlight on web-application vulnerabilities, which can be used to target any organization with an internet presence. Cyber attackers have embraced the use of automation to scan applications for vulnerabilities. Protecting against application-layer techniques such as SQL injection (SQLi), cross-site scripting (XSS), cross-site request forgery...


Moving Beyond Passwords with Risk-Based MFA

Last year, the impacts of the WannaCry, NotPetya, and Equifax cyber attacks were closely followed by the stunning disclosure of the Meltdown and Spectre vulnerabilities, increasing the sense of urgency around cybersecurity and driving spending higher than ever before. Despite increased spending on security products and services, the number of data breaches continues to rise. Funding doesn’t guarantee successful security. Organizations often waste valuable resources on practices that fail to...


Boost Your Data Strategy With Unstructured Data

Data deluge can be discouraging, but a good data strategy is all about gaining value from all of your data — no matter the format. Traditionally, data was held in structured databases, but in today’s digital age, organizations are accessing unstructured data from numerous sources and often in large amounts. Sources such as web clickstreams, text messages, social media inputs, text documents, videos and medical imaging. Management of this unstructured big data can be an undertaking, but once...


A Tale of Two Data Center Strategies: Hyperconverged vs. Composable

It’s the best of times, it’s the worst of times; it’s the age of new converged technologies, it’s the age of tightening IT budgets. Figuring out how to minimize the data center footprint, protecting data, driving down costs without sacrificing performance or resiliency; the largest initiative IT administrators are undertaking today is setting up infrastructure to help support business outcomes. This drive comes from the outstanding business need to turn ideas into value faster than the...


The Curious Case of Hybrid IT: 5 Things to Avoid

While many organizations are making a calculated leap to hybrid IT, some are stumbling upon the hybrid design by chance. In a recent survey conducted by Forrester, two-thirds of the organizations ended up with hybrid IT by accident. Additionally, only 33 percent of the businesses had designed a comprehensive hybrid IT strategy from the ground up. The other interviewees reported having to triage an organic model, or that their current plans are spinning out of control. Trying to transform...


Reducing Data Loss Risk with DLP

In today’s threat landscape, protecting data is critical to security and regulatory compliance. Organizations in all industries have become lucrative targets for hackers, and data breaches are making headlines on a daily basis. Companies need to find solutions that can help them protect sensitive data, while at the same time empowering employees to work across devices, connect to multiple networks, and work within cloud applications. Listen to this episode to learn:


A Crash Course in Securing Your Data

The key to defining data protection for your business is understanding the type of data you collect and knowing how you store and manage it. By classifying your data, you can gain a thorough understanding of your business needs and data protection goals, which will make it easier for you to build a data protection strategy that’s up to the task. In this episode of And There You Have IT!, industry experts from Sirius and Dell EMC give us a crash course on data protection and where to start...


A Guide to the Multi-Cloud Data Management Challenge

In this episode of And There You Have IT, industry experts discuss what to consider when developing a multi-cloud data management strategy. They’ll cover all the reasons why it’s a good idea to have a strategy in place, the most common challenges businesses face when developing one and the best things to keep in mind. Listen to this episode learn:


Taking SIEM to the Next Level

Organizations are suffering from cyber fatigue with too many alerts, too many technologies, and not enough people. This makes it difficult to streamline operations, and decrease the time it takes to detect and remediate security incidents. Companies that rely heavily on security information and event management (SIEM) to support threat detection efforts are increasingly complementing deployments with solutions that advance their analytics capabilities, effectively taking SIEM to the next...


Down with Dark Data: Your Strategy for Intelligent Data Management

Sponsored by Veritas In the drive to transform and modernize IT, backup remains critical. But IT modernization demands a new way of thinking about data, and that means a new way of thinking about backup. In the past, all data was backed up equally. Today, the path to modernization requires going beyond backup to intelligent data management that enables innovation while driving efficiencies. We’re speaking with industry expert Adam Shomaker to learn how organizations can gain a new...


Zero Trust Architecture: Debunking Myths

Sponsor: Palo Alto Traditional data security strategies tend to operate under a “trust but verify” approach — trusting internal users with unrestricted network access and considering the external network as the only network in need of security controls. Rooted in the principle of “never trust, always verify,” Zero Trust architecture is an alternative and individualized approach to network security that uses an organization’s functionality and business objectives to determine exactly what...


Flex Your IT Super Powers with Virtualization

Businesses depend heavily on a solid application infrastructure. Increasingly, IT is the foundation for the business and in charge of enabling organizations to innovate. Speed, agility, impenetrable security, and availability of applications are essential, but also tricky to deliver flawlessly. We spoke with industry expert, Andrew Young, about how a virtualized approach can enable IT to move as fast as the business demands without compromising the security or availability of critical...


Roadmap to Digital Transformation by 2020

Sponsored by Dell EMC Times are changing when it comes to the never-ending storage refresh cycle. By moving to a flexible consumption-based storage model, you can avoid spending too many resources on the yearly refresh, lower expenses and gain efficiencies. So, how can companies get moving on a hyperconverged storage model? We spoke with industry-expert Patrick Conway to learn how to build a roadmap to digital transformation by 2020. Listen to this episode to learn: [Webinar] Top Storage...


Convergence versus Hyperconvergence: Which Horse Should You Back in the Race to Storage Modernization

Storage is undergoing a fundamental transformation as workloads and applications demand higher performance, scalability, and resiliency. Deploying the right converged infrastructure solution can help solve these business challenges, but not all convergence is the same. So, how do you know which solution is right for your business? Today, we’re talking with industry expert Matt Coffey to learn about how to find the right solution and partner for your needs. Listen to this episode to learn...


How IT Simplification can Strengthen and Secure Your Healthcare Brand

Healthcare is constantly changing, and so must its IT. With massive consolidations and mergers driving many healthcare providers, IT organizations are tasked with supporting business-critical projects, securing data, transforming IT, and managing small capex budgets. On top of all this, IT organizations play a critical role in optimizing patient care and outcomes. We spoke with Kevin Gee, a master consultant at Forsythe, to find out how simplifying your IT can revolutionize and enhance your...


The Future of IoT Relies on Cybersecurity

Think about all of the information – personal and professional – that you’ve entrusted to the Internet of Things (IoT). Have IoT devices earned this trust we invest in them? Our interactions with IoT are so often focused on automated technology that — by choice or by habit — we often assume we can trust IoT simply because it’s not human. But, in reality, the human elements of IoT devices are critical to their success and to their failure. Just as a device can be programmed to solve...


UNIX Isn’t Dead: Debunking the Myth and Discovering the Value of UNIX

Today, we’re debunking the myth that UNIX is dead. From powering large workloads on complex systems, to lowering total cost of ownership, to merging legacy systems, we’re here to find out how Unix is not only helping businesses survive, it’s helping them thrive in disruptive markets. We spoke with industry expert Kevin Gee to find out how the myth got started and how it’s bringing still value to diverse organizations. Listen to this episode to learn: How to Build a Modern, Secure, Digital...


Machine Learning: How to Reap the Benefits and Avoid the Risks

Sponsored by: McAfee We’ve all heard the buzz about machine learning and artificial intelligence. The terms cover all kinds of exciting and cutting edge tools, but the technology is also evolving all the time. So, how should companies assess machine learning models to see if they’re right for their business? And, how can they integrate the right model, reap the benefits, and keep their risk-management in check? To learn more, we spoke with Celeste Fralick, chief data scientist and senior...


How to Make Hyperconvergence a Smooth Operation

Sponsored by: Dell EMC Hyperconvergence offers a number of benefits, but many enterprises are cautious of adopting the technology. To demystify hyperconverged infrastructure (HCI) solutions, we sat down with convergence solutions specialist Bob Perkins to talk about the deployment process. We find out how to make any HCI installation a smooth operation, from configuration all the way to implementation. Listen to this episode to learn: Hyperconvergence: More than Just Software-defined...


Hyperconvergence in Real Time

Episode Sponsor: HPE From the small and ubiquitous iPhone to the large and complex Tesla, hyperconverged platforms are enabling companies to innovate and disrupt. Is your company ready to do the same? Hyperconverged infrastructure (HCI) solutions have many use cases, but to truly realize the benefits, you have to find the right fit for your enterprise. We spoke with Bob Perkins, a convergence solutions specialist, to find out what you should know before getting started with HCI. Listen to...