Maintaining a robust, secure and compliant environment

The modern business depends on its IT systems running 24×7 and being available to users wherever they are, whatever device they use. Electronic data has also become critical, and the need to secure, protect and govern it grows continuously as external threats become more ubiquitous and as regulatory demands ramp up. The availability and security of IT systems and data is now a board room concern.

Our Content:

Mitigating AI Risks: 5 Essential Steps for Secure Adoption

Artificial intelligence (AI) and machine learning (ML) are finding their way into industries worldwide as[...]

View More
Challenging the traditional boundaries between IAM and UEM

It’s always refreshing to engage with vendors who aren’t bound by the rigid category definitions[...]

View More
Making IT sustainability more objective and actionable

I’ve heard a lot of pitches from technology companies on how they can help customers[...]

View More
The politics and practicalities of sustainable IT

A senior leadership perspective

View More
Tape is back on the main menu

The news that another of the big players in global file systems, Hammerspace, has integrated[...]

View More
Can steel fences halt the march of cyber?

Cyber: for some, it’s a prefix that conjures up images of Dr Who’s silvery cyborg[...]

View More
It’s time to look again at IT and Software Asset Management

In the realm of IT administration, it’s all too easy to get stuck in familiar[...]

View More
Standardized solution implementation services

Shorten time-to-value, reduce costs and risks, and future-proof your investment

View More
Digital identity: the many images of you

More and more of the topics we deal with at Freeform Dynamics now also relate[...]

View More
Trust: easy to lose, hard to recover

Here are just a few of the topics that my fellow Freeformers and I have[...]

View More
Getting real about IT sustainability

From good intentions to tangible results through smart systems selection

View More
Have you made the right platform choices to minimise risk?

Critical systems have to run and run…

View More
S/4HANA without compromise

A modern ERP architecture needs a powerful and future-proof platform

View More
Digital identity and opening up the smartwallet

When an 80 year-old relative asks you how she can use her phone to both[...]

View More
Linux and sustainability

The emerging role of modern, high-scale consolidation platforms

View More
Singing the key management blues

We need cryptographic keys, but who is going to manage them?

View More
Why does ransomware still work?

As someone who first encountered ransomware during the last millennium

View More
Ransomware teaches the importance of data protection

Several years ago, around the time that ransomware attacks started making the front pages

View More
Forget the ‘free’ software, the real value of open-source is the collaboration

Analyst Opinion: It’s a cliché, but why are we still reinventing wheels?

View More
Which is worse: noise, or the sound of silence?

Analyst Opinion: If you’re one of the many people who find offices too noisy

View More
Achieving success with your S/4HANA proof of concept (POC)

What to consider when selecting platforms, tools and services

View More
The business need for simpler storage

What to consider when planning for modern IT in the hybrid cloud era

View More
How to boost supplier commitment without spending more money

Time to tune into those non-revenue goals

View More
Data governance in software testing

Throwback Thursday: this week we're going back to 2008

View More
The importance of modern data archiving

In today’s business world, the value of archiving is greater than ever

View More
Covid quick fix payback time

How long will people put up with the emergency fixes?

View More
Dispelling the myth of the industry-standard server

What you thought you knew has changed

View More
Identity and access management revisited

A changing world demands simplification and an urgent focus on security

View More
Zero Trust: securing the endpoint

How continuous authentication could help secure the work-anywhere world

View More
A new perspective on the modern workplace

Forward-looking lessons from real-life pandemic experiences

View More
Safe and Effective Remote Working

Addressing immediate pandemic-related needs while laying foundations for the future

View More
Network security in the spotlight

Understanding why it can go wrong is key to making the right investment decisions

View More
Lifecycle Management of HCI Systems

Every element of the solution needs attention

View More
Why backup to flash

Analyst Blog: There are some things that simply have to happen, no matter how modern[...]

View More
Digital workspace disasters and how to beat them

New roles for user management and app deployment in the digital workspace

View More
GDPR: the Security Dimension

Information security, governance and regulation in harmony

View More
Causes of software development woes

Respondents point the finger at ambiguous requirements

View More
Information management is going mainstream – at last!

Analyst opinion Some assumptions have been held by IT pros for so long that they[...]

View More
GDPR’s latest gift? Class action privacy cases

Analyst opinion Europeans will in future be able to bring US-style class actions for (alleged)[...]

View More
Getting a grip on the GDPR

Here's our tips on how to plan rather than panic

View More
Enterprise file sync and share comes of age

The enterprise file sync and share market has truly come of age, with products and[...]

View More
Managing Web and Mobile Security Risk

Securing the applications and services that underpin your online and mobile presence is one thing,[...]

View More
A peek behind the AI bandwagon

When an important topic or trend gives rise to a marketing and media bandwagon, any[...]

View More
Data encryption must be a priority for the digital business

Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise[...]

View More
Cyber Security Ownership and Responsibility

It’s easy to be caught out by a cyber attack or internal mistake that leads[...]

View More
APIs and the Digital Enterprise

Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]

View More
Building a Curated Digital Hub

In a nutshell In today’s online business environment, with data spread broadly and widely, making[...]

View More
Tackling End User Content Sprawl

In a nutshell The problem of content sprawl has been around since the early days[...]

View More
Readers of The Register speak out on Thin Client technology

Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]

View More
Network Security Solutions

IT Security is complex and trying to work out whether it is better to use[...]

View More
Data Protection and Management in a Box

In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]

View More
Taking Cyber Security to the Next Level

As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]

View More
Mobile Security and the Challenge of User Resistance

Mobile security is becoming more of a headache as the crossover between business and personal[...]

View More
Future Proofing Your Network

Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]

View More
Cloud and Security Challenges

Cloud adoption is taking place in organisations of all sizes. Internal cloud systems are being[...]

View More
Cloud Security Temperature Check

In a recent online survey in which responses were gathered from almost three hundred IT[...]

View More