Helping clients manage their technology for over 30 years.

Where technology consulting services can help

Technology Consulting Services by Quest

In my last post, I advised that a technology consulting services provider should offer a range of capabilities that encompasses integrated managed services, cloud services, and assessments as well as an extensive professional services portfolio emphasizing technology customization and solid technical staffing.

Such technology consulting depth means your provider can help you in many ways, including:
Continue reading

Application security: As apps proliferate, so do vulnerabilities

Application Security by Quest

These days, two-thirds of all applications rely on open-source components. While open source has many virtues, it also has a key vice: once an open source component is integrated into an application, that app inherits any vulnerabilities it contains.

Further, whenever that application is referenced by other software, the inheritance of the initial vulnerability persists. The 2014 Heartbleed bug occurred in this way, and some version of this issue is likely to keep happening because most vendors don’t list all the third-party components their software relies on.
Continue reading

What you need for successful customized app development

Customized App Development by Quest

These days, a successful app saves time and enables quick and easy access to its features. It’s available anywhere and at any time with relevant contextual experiences. It allows your customer to control the interaction and offers both flawless uptime and minimal power use.

And perhaps most critically, a successful app fits both your business and your customers like a glove — something that requires app customization.

As I delineated in my last post, the payoffs can — and should — be substantial. Customized mobile apps in particular lower costs, improve employee productivity, and significantly strengthen your relationship with your customers.

Appreciating the bottom-line power of developing customized apps

Developing Customized Apps by Quest

How important are apps to your business?

If your enterprise is like most, the answer is VERY. And the chief reason centers on the rising importance of mobile “presence.” Without such presence, just about every business will soon struggle to compete.

Sometimes, however, not even a good mobile app is enough, because app users — which is to say, your customers — have become demanding. And picky.

Disruptive technologies:
Coming soon to an industry sector near you

Disruptive Technologies by Quest

Anyone familiar with Uber or Airbnb will agree that well-deployed disruptive technologies can be dramatic and industry-upending. Even so, if your business earns its living far from such events, you may think you have years yet before needing to deal with “anything like that.”

You might want to think again, however. This season’s analyst predictions about 2016* stand out for their warnings about the reach and speed of disruptive technologies.
Continue reading

Staying competitive with tech customization:
Here’s what you need to know

Competitive with Technology Customization by Quest

There’s no question that information technology is changing the way everybody does business. I see this up-close daily as we help customers streamline IT operations as well as create and deploy innovative new digital capabilities.

What I’ve noticed of late is the buzz about customized development of software and platforms. This is certainly understandable: more than 70% of companies complain they can’t find the perfect system.
Continue reading

5 Capabilities That Your Wireless Network Needs Now

wireless network management

We can’t afford to ignore the myriad of mobile devices and apps currently saturating our attention and wireless connections.

In my last post, I laid out some of the industry’s eye-popping numbers. This time, I’m offering up just one graphic (from Cisco’s recent Global Mobile Data Traffic Forecast Update) showing why you must upgrade your network infrastructure. Pronto. Continue reading

98% of Apps are Insecure — Here’s How You Can Protect Yours

Mobile phone with password on screen to illustrate mobile security services

Sadly, one can make the argument that if software vendors did a better job of integrating security testing throughout the development lifecycle, our current struggles with application security might be less challenging.

In fact, however, software vendors are late to the party. Their security testing tends to be tacked on to the end of development lifecycles as an afterthought, which may account for one recent study’s startling conclusions that:

  • 98% of applications carry at least one application security risk (and each risk may signal the presence of multiple vulnerabilities)
  • 80% of applications showed more than five risks
  • The average application registered 22.4 risks

Continue reading

Apps, Apps Everywhere — But How Secure Are Yours

Did you know that your applications are the most vulnerable part of your IT operations?

iPhone with lock to symbolize Cloud Security. Cloud in background

These days, problems with apps — many of them web-based apps — account for the majority of information security breaches. Over the last year or so, and going forward, application-level attacks have emerged as the preferred vector for gaining access to sensitive (and valuable) data. What’s more, the threats are becoming increasingly acute as complex web apps, as well as mobile apps, play ever greater roles in our business and personal activities.

App vulnerabilities for sale — cheap at the price? Continue reading

A Glimpse of What’s on the 2014 Tech Horizon …

Four dice showing 2013. Last die is rotating from 3 to 4 for 2014

As 2013 comes to a close, it’s time to look ahead, and a good place to start is Gartner’s top ten strategic technology trends for 2014, which point to an accelerating velocity of change that we ignore at our peril:

Continue reading