Category Archives: 6. Evolution of Cybersecurity

BPM from back office to front office and beyond

Are you tough enough to take on BPM and win? Someone has to. It has[...]

Energy Aware Planning and Decision Making

Energy availability and management is increasingly becoming an important agenda item for IT leaders, but[...]

Seven enablers of effective disaster recovery for SMEs

By Tony Lock In a nutshell: Recent research carried out by Freeform Dynamics identified seven[...]

Key points to highlight when selling storage

Organisations of all shapes and sizes are struggling to deal with the rapid growth of[...]

Fast Forward to Big Data

Does ’cloud’ have a roll in providing customers with access to new data sources to[...]

The great DR divide

Business continuity solutions only for large organisations? IT vendors and consulting firms who sell disaster[...]

User Virtualization – Moving beyond device-centric computing

When business IT was young and channel partners had plenty of hardware margins to play[...]

Winners and losers in the information race

The mainstream media generally portrays the financial services industry as being in a total mess,[...]

The secrets of effective disaster recovery

There’s no magic bullet, but there’s a formula Many IT and business executives groan when[...]

Closing the SMB security gap

It’s got the point where the majority of small and medium businesses (SMBs) take the[...]

Data retention, FOI and the storage budget

The data retention policy in too many organisations has historically boiled down to ‘keep everything[...]

The storage boom and bust cycle

More data more often than not means more disks. It was ever thus – but[...]

The consumerisation of IT: it’s a trickle, not a tide, but you still need to be ready

If media headlines and vendor claims are to be believed, organisations today are faced with[...]

Enabling Rapid and Effective IT Recovery

IT vendors have traditionally targeted the lucrative large enterprise market with their data protection and[...]

Disaster Recovery in European SMBs

By Tony Lock, Martha Bennett and Dale Vile KEY POINTS The term ‘disaster recovery’ is[...]

The Consumerisation of IT (Slides)

Audience – IT & Business professionals Occasion – VMUG Meeting, Leeds, October 2011 Presenter(s) –[...]

The SME security challenge

Over the years, research findings have consistently demonstrated widespread exposure to risk when it comes[...]

Time to get serious about managing security

Do you know what’s running in your network? In this time of ever increasing security[...]

Compliance: The legal landscape and how to navigate it

Every IT professional recognises the im­portance of securing the IT systems on which critical business[...]

The evolution of desktop security

The operating habits of users render passwords as the primary mechanism to secure any application[...]

The workload challenge

Today, IT Infrastructure is evolving at a tremendous pace. The Mainframe computer, now often referred[...]

RSA hack demonstrates need for proactive security and multi-layer protection

The recent news that RSA Security suffered a security attack and breach that resulted in[...]

Trust and security in the cloud

By Andrew Buss & Dale Vile KEY FINDINGS Many companies could do much better when[...]

The realities of SaaS and Security

With upgrades to Windows 7 and Office 2010 high on the agenda, questions are being[...]

© Freeform Dynamics Limited - 2006 - 2024. All rights reserved. Unauthorised use of copy is not permitted.