Maintaining a robust, secure and compliant environment
The modern business depends on its IT systems running 24×7 and being available to users wherever they are, whatever device they use. Electronic data has also become critical, and the need to secure, protect and govern it grows continuously as external threats become more ubiquitous and as regulatory demands ramp up. The availability and security of IT systems and data is now a board room concern.
Our Content:
Mitigating AI Risks: 5 Essential Steps for Secure Adoption
Artificial intelligence (AI) and machine learning (ML) are finding their way into industries worldwide as[...]
View MoreChallenging the traditional boundaries between IAM and UEM
It’s always refreshing to engage with vendors who aren’t bound by the rigid category definitions[...]
View MoreMaking IT sustainability more objective and actionable
I’ve heard a lot of pitches from technology companies on how they can help customers[...]
View MoreTape is back on the main menu
The news that another of the big players in global file systems, Hammerspace, has integrated[...]
View MoreCan steel fences halt the march of cyber?
Cyber: for some, it’s a prefix that conjures up images of Dr Who’s silvery cyborg[...]
View MoreIt’s time to look again at IT and Software Asset Management
In the realm of IT administration, it’s all too easy to get stuck in familiar[...]
View MoreStandardized solution implementation services
Shorten time-to-value, reduce costs and risks, and future-proof your investment
View MoreDigital identity: the many images of you
More and more of the topics we deal with at Freeform Dynamics now also relate[...]
View MoreTrust: easy to lose, hard to recover
Here are just a few of the topics that my fellow Freeformers and I have[...]
View MoreGetting real about IT sustainability
From good intentions to tangible results through smart systems selection
View MoreHave you made the right platform choices to minimise risk?
Critical systems have to run and run…
View MoreS/4HANA without compromise
A modern ERP architecture needs a powerful and future-proof platform
View MoreDigital identity and opening up the smartwallet
When an 80 year-old relative asks you how she can use her phone to both[...]
View MoreSinging the key management blues
We need cryptographic keys, but who is going to manage them?
View MoreWhy does ransomware still work?
As someone who first encountered ransomware during the last millennium
View MoreRansomware teaches the importance of data protection
Several years ago, around the time that ransomware attacks started making the front pages
View MoreForget the ‘free’ software, the real value of open-source is the collaboration
Analyst Opinion: It’s a cliché, but why are we still reinventing wheels?
View MoreWhich is worse: noise, or the sound of silence?
Analyst Opinion: If you’re one of the many people who find offices too noisy
View MoreAchieving success with your S/4HANA proof of concept (POC)
What to consider when selecting platforms, tools and services
View MoreThe business need for simpler storage
What to consider when planning for modern IT in the hybrid cloud era
View MoreHow to boost supplier commitment without spending more money
Time to tune into those non-revenue goals
View MoreData governance in software testing
Throwback Thursday: this week we're going back to 2008
View MoreThe importance of modern data archiving
In today’s business world, the value of archiving is greater than ever
View MoreIdentity and access management revisited
A changing world demands simplification and an urgent focus on security
View MoreZero Trust: securing the endpoint
How continuous authentication could help secure the work-anywhere world
View MoreA new perspective on the modern workplace
Forward-looking lessons from real-life pandemic experiences
View MoreSafe and Effective Remote Working
Addressing immediate pandemic-related needs while laying foundations for the future
View MoreNetwork security in the spotlight
Understanding why it can go wrong is key to making the right investment decisions
View MoreWhy backup to flash
Analyst Blog: There are some things that simply have to happen, no matter how modern[...]
View MoreDigital workspace disasters and how to beat them
New roles for user management and app deployment in the digital workspace
View MoreCauses of software development woes
Respondents point the finger at ambiguous requirements
View MoreInformation management is going mainstream – at last!
Analyst opinion Some assumptions have been held by IT pros for so long that they[...]
View MoreGDPR’s latest gift? Class action privacy cases
Analyst opinion Europeans will in future be able to bring US-style class actions for (alleged)[...]
View MoreEnterprise file sync and share comes of age
The enterprise file sync and share market has truly come of age, with products and[...]
View MoreManaging Web and Mobile Security Risk
Securing the applications and services that underpin your online and mobile presence is one thing,[...]
View MoreA peek behind the AI bandwagon
When an important topic or trend gives rise to a marketing and media bandwagon, any[...]
View MoreData encryption must be a priority for the digital business
Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise[...]
View MoreCyber Security Ownership and Responsibility
It’s easy to be caught out by a cyber attack or internal mistake that leads[...]
View MoreAPIs and the Digital Enterprise
Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]
View MoreBuilding a Curated Digital Hub
In a nutshell In today’s online business environment, with data spread broadly and widely, making[...]
View MoreTackling End User Content Sprawl
In a nutshell The problem of content sprawl has been around since the early days[...]
View MoreReaders of The Register speak out on Thin Client technology
Managing PC estates is a time-consuming, expensive and thankless task. Better provisioning and management tools[...]
View MoreNetwork Security Solutions
IT Security is complex and trying to work out whether it is better to use[...]
View MoreData Protection and Management in a Box
In today’s fast-moving, information-intensive business environment, data management is more of a challenge than ever.[...]
View MoreTaking Cyber Security to the Next Level
As cyber security threats become more sophisticated, targeted and persistent, it’s no longer possible to[...]
View MoreMobile Security and the Challenge of User Resistance
Mobile security is becoming more of a headache as the crossover between business and personal[...]
View MoreFuture Proofing Your Network
Network traffic flows have become pretty complex in today’s distributed business environment, and not just[...]
View MoreCloud and Security Challenges
Cloud adoption is taking place in organisations of all sizes. Internal cloud systems are being[...]
View MoreCloud Security Temperature Check
In a recent online survey in which responses were gathered from almost three hundred IT[...]
View More