Category Archives: 6. Evolution of Cybersecurity
BPM from back office to front office and beyond
Are you tough enough to take on BPM and win? Someone has to. It has[...]
Energy Aware Planning and Decision Making
Energy availability and management is increasingly becoming an important agenda item for IT leaders, but[...]
Seven enablers of effective disaster recovery for SMEs
By Tony Lock In a nutshell: Recent research carried out by Freeform Dynamics identified seven[...]
Key points to highlight when selling storage
Organisations of all shapes and sizes are struggling to deal with the rapid growth of[...]
Fast Forward to Big Data
Does ’cloud’ have a roll in providing customers with access to new data sources to[...]
The great DR divide
Business continuity solutions only for large organisations? IT vendors and consulting firms who sell disaster[...]
User Virtualization – Moving beyond device-centric computing
When business IT was young and channel partners had plenty of hardware margins to play[...]
Winners and losers in the information race
The mainstream media generally portrays the financial services industry as being in a total mess,[...]
The secrets of effective disaster recovery
There’s no magic bullet, but there’s a formula Many IT and business executives groan when[...]
Closing the SMB security gap
It’s got the point where the majority of small and medium businesses (SMBs) take the[...]
Data retention, FOI and the storage budget
The data retention policy in too many organisations has historically boiled down to ‘keep everything[...]
The storage boom and bust cycle
More data more often than not means more disks. It was ever thus – but[...]
The consumerisation of IT: it’s a trickle, not a tide, but you still need to be ready
If media headlines and vendor claims are to be believed, organisations today are faced with[...]
Enabling Rapid and Effective IT Recovery
IT vendors have traditionally targeted the lucrative large enterprise market with their data protection and[...]
Disaster Recovery in European SMBs
By Tony Lock, Martha Bennett and Dale Vile KEY POINTS The term ‘disaster recovery’ is[...]
The Consumerisation of IT (Slides)
Audience – IT & Business professionals Occasion – VMUG Meeting, Leeds, October 2011 Presenter(s) –[...]
The SME security challenge
Over the years, research findings have consistently demonstrated widespread exposure to risk when it comes[...]
Time to get serious about managing security
Do you know what’s running in your network? In this time of ever increasing security[...]
Compliance: The legal landscape and how to navigate it
Every IT professional recognises the importance of securing the IT systems on which critical business[...]
The evolution of desktop security
The operating habits of users render passwords as the primary mechanism to secure any application[...]
The workload challenge
Today, IT Infrastructure is evolving at a tremendous pace. The Mainframe computer, now often referred[...]
RSA hack demonstrates need for proactive security and multi-layer protection
The recent news that RSA Security suffered a security attack and breach that resulted in[...]
Trust and security in the cloud
By Andrew Buss & Dale Vile KEY FINDINGS Many companies could do much better when[...]
The realities of SaaS and Security
With upgrades to Windows 7 and Office 2010 high on the agenda, questions are being[...]