Quest Technology Management

Helping clients manage their technology for over 30 years.

Is your network management ready for the hyperconnectivity juggernaut?

Connectivity strength signal

As I noted in my last post, increases in both computing devices and IP traffic volumes put new demands on enterprise networks — and alters what’s required to manage those networks effectively. This juggernaut of hyperconnectivity is already underway:

  • By 2018, the average person will have five network-connected devices and networks will host four times more data traffic than they do now
  • By 2019, global per capita Internet traffic will stand at 37 gigabytes, up from 15.5 GB per capita last year

Continue reading

Get ready for the zettabyte networking era

Traffic light icon

Many new technologies hold promise for your business —mobile devices, cloud computing, virtualization, big data, the Internet of Things — but they also pose challenges to your enterprise network’s performance and your ability to conduct effective network performance monitoring.

Often this is because many enterprise networks are based on outmoded models that result in performance bottlenecks as network traffic increases. Continue reading

It’s 2015. How Should You Cloud?

Conversation cloud bubbles

Cloud computing is now pretty much everywhere — including in smaller enterprises, some 37% of which have already adopted cloud computing. This year U.S. small and midsized businesses are expected to boost what they spend on cloud computing by 28%.

Still, in 2015 cloud computing remains a work in progress, and at Quest we get lots of questions from customers about how to cloud.
Continue reading

How app dev puts business at risk — and what to do about it

In a recent survey, 43% of IT decision makers rated mobility — which is to say, mobile-friendly apps or sites — as the top business functionality or process that’s critical for applications. These days, the line between the web and mobility has blurred to the point of invisibility.

Trouble is, successfully achieving secure mobile application development and web application development is hard for a significant majority of organizations.
Continue reading

[Slideshow] 4 reasons why Windows Server 2003 End of Life matters

  • Windows Server 2003 end of life

Continue reading

New app dev challenges in 2015 — Are you ready?

mobile app development challenges

Regardless of the sector in which your business operates or its size, conducting mobile and web application development has never been more important – because it’s never had more of a competitive impact.

It’s not without challenges, however. That’s because application development software technologies and IT environments change quickly, and app dev itself has never been more complex. Keeping up is tough and getting tougher.
Continue reading

Application Security Scanning Can Save Your Business

Magnifying glass photograph

Web and mobile applications are everywhere, often working 24×7. They handle login pages, shopping carts, webmail, support and product request forms, content management systems, and much more.

These apps perform in numerous client-side browser and operating system environments, and can be deployed quickly, just about anywhere, and at little or no cost. Although they may be developed in-house, many are acquired from third parties. More than 90% of enterprises use third-party offerings in their mobile BYOD efforts, according to Gartner. Continue reading

Conquering Cybersecurity Problems: Managed IT Services Can Help

Blue security button

In my last post, I described some of the key ways Managed IT Services help monitor networks and applications, conduct real-time analysis of security alerts, and streamline management of security reporting and policy compliance.

Important as these Managed IT Services are, however, the IT-centric capabilities they provide are just part of a larger IT security picture. Unquestionably, these capabilities are necessary, but they are by no means sufficient – especially if your goal is (as it should be) to create and sustain multiple security layers that are proactive and preventive. Continue reading

The IT Security Arms Race: How Well Are You Keeping Up?

Hands typing quickly on a keyboard

Today’s digitization of just about everything – especially a whole lot of business data – means the technologies your organization depends on may be changing more quickly than you think.

Of course, this has been true for some time. But for a while it wasn’t the case – software patches and antivirus updates were less frequent, and the sense of urgency was by similar degree, less as well.

Alas, that was then. Now if you let your IT environment – especially your security stance – fall behind, you could be left exposed to some pretty insidious threats.
Continue reading