Maintaining a robust, secure and compliant environment
The modern business depends on its IT systems running 24×7 and being available to users wherever they are, whatever device they use. Electronic data has also become critical, and the need to secure, protect and govern it grows continuously as external threats become more ubiquitous and as regulatory demands ramp up. The availability and security of IT systems and data is now a board room concern.
Our Content:
Mitigating AI Risks: 5 Essential Steps for Secure Adoption
Artificial intelligence (AI) and machine learning (ML) are finding their way into industries worldwide as[...]
View MoreChallenging the traditional boundaries between IAM and UEM
It’s always refreshing to engage with vendors who aren’t bound by the rigid category definitions[...]
View MoreMaking IT sustainability more objective and actionable
I’ve heard a lot of pitches from technology companies on how they can help customers[...]
View MoreTape is back on the main menu
The news that another of the big players in global file systems, Hammerspace, has integrated[...]
View MoreCan steel fences halt the march of cyber?
Cyber: for some, it’s a prefix that conjures up images of Dr Who’s silvery cyborg[...]
View MoreIt’s time to look again at IT and Software Asset Management
In the realm of IT administration, it’s all too easy to get stuck in familiar[...]
View MoreStandardized solution implementation services
Shorten time-to-value, reduce costs and risks, and future-proof your investment
View MoreDigital identity: the many images of you
More and more of the topics we deal with at Freeform Dynamics now also relate[...]
View MoreTrust: easy to lose, hard to recover
Here are just a few of the topics that my fellow Freeformers and I have[...]
View MoreGetting real about IT sustainability
From good intentions to tangible results through smart systems selection
View MoreHave you made the right platform choices to minimise risk?
Critical systems have to run and run…
View MoreS/4HANA without compromise
A modern ERP architecture needs a powerful and future-proof platform
View MoreDigital identity and opening up the smartwallet
When an 80 year-old relative asks you how she can use her phone to both[...]
View MoreSinging the key management blues
We need cryptographic keys, but who is going to manage them?
View MoreWhy does ransomware still work?
As someone who first encountered ransomware during the last millennium
View MoreRansomware teaches the importance of data protection
Several years ago, around the time that ransomware attacks started making the front pages
View MoreForget the ‘free’ software, the real value of open-source is the collaboration
Analyst Opinion: It’s a cliché, but why are we still reinventing wheels?
View MoreWhich is worse: noise, or the sound of silence?
Analyst Opinion: If you’re one of the many people who find offices too noisy
View MoreAchieving success with your S/4HANA proof of concept (POC)
What to consider when selecting platforms, tools and services
View MoreThe business need for simpler storage
What to consider when planning for modern IT in the hybrid cloud era
View MoreHow to boost supplier commitment without spending more money
Time to tune into those non-revenue goals
View MoreData governance in software testing
Throwback Thursday: this week we're going back to 2008
View MoreThe importance of modern data archiving
In today’s business world, the value of archiving is greater than ever
View MoreIdentity and access management revisited
A changing world demands simplification and an urgent focus on security
View MoreZero Trust: securing the endpoint
How continuous authentication could help secure the work-anywhere world
View MoreA new perspective on the modern workplace
Forward-looking lessons from real-life pandemic experiences
View MoreSafe and Effective Remote Working
Addressing immediate pandemic-related needs while laying foundations for the future
View MoreNetwork security in the spotlight
Understanding why it can go wrong is key to making the right investment decisions
View MoreWhy backup to flash
Analyst Blog: There are some things that simply have to happen, no matter how modern[...]
View MoreDigital workspace disasters and how to beat them
New roles for user management and app deployment in the digital workspace
View MoreDealing with the GDPR Challenge Infographic
The catalyst for a move to modern data protection
View MoreData Protection Revisited – Business
A risk review and investment guide for business executives
View MoreData Management for a Digital World
Turn GDPR compliance and ransomware defence to your advantage
View MoreCauses of software development woes
Respondents point the finger at ambiguous requirements
View MoreIntegrating Security Into the DNA of Your Software Lifecycle
“Masters” move beyond pure risk management to focus on business growth
View MoreRequirements-driven software development and quality management
Removing the ambiguity from your delivery pipeline
View MoreInformation management is going mainstream – at last!
Analyst opinion Some assumptions have been held by IT pros for so long that they[...]
View MoreGDPR’s latest gift? Class action privacy cases
Analyst opinion Europeans will in future be able to bring US-style class actions for (alleged)[...]
View MoreSo long, and thanks for all the phish
How to avoid that hook at the end of a fraudster’s line
View MoreDon’t Let an Outdated Software Strategy Hold You Back
Yesterdays software delivery processes are not up to dealing with today’s demands, but modernising you[...]
View MoreEnterprise file sync and share comes of age
The enterprise file sync and share market has truly come of age, with products and[...]
View MoreManaging Web and Mobile Security Risk
Securing the applications and services that underpin your online and mobile presence is one thing,[...]
View MoreIT Decision-Making in the Digital Age
Making the right technology investments in today’s fast moving digital age can mean the difference[...]
View MoreProtecting data in your hyper-converged environment
In a nutshell Hyper-converged infrastructure (HCI) has been gaining popularity as a way of simplifying[...]
View More