Helping clients manage their technology for over 30 years.

How DaaS impacts your IT environment

Desktops as a Service (DaaS)

The idea that the guts of an employee’s work environment which has for so long resided on his or her individual desktop PC might reside somewhere else is an idea that takes some getting used to.

So let’s take a few minutes to consider what this really means in terms of…

Security:  Because DaaS — Desktop-as-a-Service — puts each employees desktop image in the Cloud, employee apps and data stay secure — even as individual employee desktop images are rapidly deployed on-demand to virtually any device (including employee-owned devices), anywhere those employees may be (as long as they have Internet access).

Continue reading

Essentials to business disaster preparedness — #2: Use data loss prevention technology

Data Loss Prevention Solutions

If you don’t know much about your data, backing it up can be a challenge. Important data can be missed if it’s been squirreled away in some obscure location. And corrupted and/or hacked data can be taken as legitimate, backed up, and given an opportunity to re-infect other data and apps.

Fortunately, it’s a challenge that can be met with data loss prevention solutions that…

Continue reading

And now for the how of developing web and mobile apps

mobile application development icons

As I pointed out in my last entry, the ability to field web and mobile applications is quickly becoming a business necessity for even small enterprises.

If you’re lacking the substantial developer expertise needed to accomplish that — and most smaller and midsize organizations are — than your best option is to search out an accomplished web/mobile app development services provider.

Continue reading

Are the applications you use endangering your business? A look at the problem

application security

With all the security your IT operations (should) have, you’d think this question would be moot — but it isn’t. The applications your business and your employees rely on could be time-bombs poised to destroy your ability to function.

That’s because the vast majority of applications used in business today are connected to the Internet, often in a variety of ways.

Continue reading

What Cloud Computing can deliver — Part 2, on better security and compliance

How Cloud Computing Delivers Improved Security and Compliance

The centralization of apps, data, and management that’s an essential part of well-conceived and well-managed Cloud environments also helps make them more secure. Why? Because security policy is easier to enforce, threats to apps and data are easier to detect and address.

Since Cloud data and apps are centralized in a data center, it’s actually easier (as compared to traditional siloed IT infrastructures) to establish effective security policy, monitor compliance, and intervene quickly and often preventatively when there are issues

Continue reading

When threats come from the inside

Eliminate the Risk of Internal Data Theft using DLP (Data Loss Prevention)

Don’t underestimate the threat to your business posed by insider data theft. The risk is real and you are not being paranoid if you worry about it.

Consider, for instance, these disturbing factoids from a Symantec-sponsored 2011 study ominously entitled Behavioral Risk Indicators of Malicious Insider Theft of Intellectual Property: Misreading the Writing on the Wall, which closely examined 50 insider thefts:

Continue reading