Helping clients manage their technology for over 30 years.

Staying competitive with tech customization:
Here’s what you need to know

Competitive with Technology Customization by Quest

There’s no question that information technology is changing the way everybody does business. I see this up-close daily as we help customers streamline IT operations as well as create and deploy innovative new digital capabilities.

What I’ve noticed of late is the buzz about customized development of software and platforms. This is certainly understandable: more than 70% of companies complain they can’t find the perfect system.
Continue reading

Desktop Virtualization Services: More Options Than You May Realize

As we watch dreams of mobility coming true around us every day, the appeal of desktop virtualization is obvious. Pile on seemingly perpetual Windows end-of-life concerns, and that appeal only grows.

VDI — virtual desktop infrastructure — enables enterprises to optimize costs by continuing use of legacy systems, while also running the latest applications and remotely publishing them to any device. Managing VDI is complex, however – the acquisition, care, and feeding of its infrastructure is costly and demands expertise many do not have.

Enter desktop virtualization services, which take VDI either wholly or partly into the cloud. Continue reading

2 Steps to Choosing a Cloud-Based Disaster Recovery (DR) Provider

Disaster Recovery Best Practices - Quest

Disaster Recovery is one of those best practices you can’t imagine needing – until your business gets hit by a power failure, bad weather, or a single-point-of-system failure you didn’t realize was there.

Suddenly, you need help. You need the right provider with the right solution, right now. In my last post, I reviewed the reasons why a cloud-based Disaster Recovery solution may be the best proactive measure for sustained resilience and outright prevention.

It remains sound advice – but how do you choose the right provider of cloud-based DR services? Continue reading

Planning Your Hybrid Cloud: 6 Key Steps (part 2)

Architecture blueprint as a model for cloud planning

In my last post I focused on the first two steps in planning for a hybrid cloud: Making sure your IT infrastructure is “cloudified” and assessing your current environment and workloads. In this post, I’ll lay out the final four steps:  Continue reading

Planning Your Hybrid Cloud: 6 Key Steps (in 2 parts)

Information Cloud

By some accounts, better than 50% of organizations are now deploying hybrid clouds — and for some very good reasons:

  • Improved security, because sensitive data can remain behind your private cloud firewall while less sensitive data can be permitted onto a public cloud.
  • Ability to specify where and under what terms and conditions your data is stored.
  • Effective workload balancing without breaking the bank, since using a public cloud to, say, handle peak loads can be far cheaper than keeping everything in-house or moving everything to a public cloud.

To get a hybrid cloud up and running, you need to begin with planning — specifically, a six-step planning process that, fortunately, you do not have to undertake alone. In this post, I’ll focus on the first two steps: Continue reading

What to Look For in IT Operations Analytics Capabilities

iPhone sitting on background with map of the world and charts and graphs coming out of the phone.

In my last post, I discussed how IT operations analytics can transform the masses of IT performance data into insight that provides broad, cross-tier network and infrastructure visibility so that …

  1. Issues may be proactively recognized and resolved before they affect your business
  2. Future capacity and provisioning requirements may be anticipated
  3. A performance baseline built from multiple metrics can be established, reducing the time, money, and headaches associated with planning and deploying new projects, such as cloud deployments or virtualization.

But how should you go about choosing an IT operations analytics solutions? This is worth paying attention to, since such solutions are new, called by a number of different names (though likely not for long) and are available both as appliances and cloud-based services. Continue reading

When IT Performance Monitoring Gets a “Big Data” Boost

Businessman standing on Cloud looking at world map covered with image representing Cloud data. And a giant Q from the Quest logo

No doubt you’ve heard about “big data.” It sounds intimidating, invasive, and, well, way too big. But don’t be fooled — “big data” is going to save your IT infrastructure.

The first thing you need to understand about how this is happening (oh yes, it’s already well underway) is that “big data” is something of a misnomer. What we’re really talking about is analytics — automated mathematical tools that work in real time to sift through untold amounts of regular old data, in this case IT performance data, and produce actionable results that go far beyond legacy monitoring capabilities. Continue reading

Why cloud DR pays off in a mission-critical IT world

Shield on a cloud to illustrate Cloud Security

Not so long ago, the best way to assure your organization would survive a major disruption involved building — and continuously paying for — a dedicated recovery site. Like so many early-generation IT solutions, this one was unaffordable for most smaller businesses.

Happily, the very technologies that generate disruption-causing complexity (see my last post) also provide the kinds of cost-effective capabilities, such as real-time replication and managed disaster recovery services, that today’s heavily mission- and business-critical IT environments require. Continue reading

98% of Apps are Insecure — Here’s How You Can Protect Yours

Mobile phone with password on screen to illustrate mobile security services

Sadly, one can make the argument that if software vendors did a better job of integrating security testing throughout the development lifecycle, our current struggles with application security might be less challenging.

In fact, however, software vendors are late to the party. Their security testing tends to be tacked on to the end of development lifecycles as an afterthought, which may account for one recent study’s startling conclusions that:

  • 98% of applications carry at least one application security risk (and each risk may signal the presence of multiple vulnerabilities)
  • 80% of applications showed more than five risks
  • The average application registered 22.4 risks

Continue reading

Apps, Apps Everywhere — But How Secure Are Yours

Did you know that your applications are the most vulnerable part of your IT operations?

iPhone with lock to symbolize Cloud Security. Cloud in background

These days, problems with apps — many of them web-based apps — account for the majority of information security breaches. Over the last year or so, and going forward, application-level attacks have emerged as the preferred vector for gaining access to sensitive (and valuable) data. What’s more, the threats are becoming increasingly acute as complex web apps, as well as mobile apps, play ever greater roles in our business and personal activities.

App vulnerabilities for sale — cheap at the price? Continue reading