Helping clients manage their technology for over 30 years.

Cloud Computing best practice: 4 security must-dos

Cloud on blue background with a lock in front. To illustrate Cloud Managed Services and Security services from Quest.

Your Cloud provider isn’t the only one with responsibility for the security of the information and applications your enterprise depends on. When it comes to security in the Cloud, it’s a collaboration between provider and customer.

After all, there are limits to a Cloud provider’s reach. For instance, if your employees use compromised web browsers to access data in the Cloud, your provider cannot be blamed.

Continue reading

Cloud Computing best practice: Evaluate Cloud provider security with these 7 questions

Person writing on glass the words good, better, best. The word best is circled.

Unless you’re an expert in security issues, doing proper Cloud provider due diligence can be daunting. Yet it’s essential, given the importance of your business’s data and applications.

So I offer seven questions for you to ask of every Cloud provider you’re considering. Pay attention to the answers you get and don’t hesitate to demand drilldown details. Remember: You’re contemplating putting at least some of the data and apps your business relies on into this provider’s Cloud environment.
Continue reading

All they want for Christmas is … Web 3.0?

Just when you were getting used to the idea of Web 2.0, along comes Web 3.0, which, according to a recent Booz & Co. report, “will offer an entirely new level of connectivity, communications, and information on customers.”

Search engines will be smarter, recommendation engines will know more about users’ habits and preferences, social media will continue to flower, and new kinds of services will make it all easy to manage. Booz calls this “the Transcendent Web” and notes it has four key elements:
Continue reading

Dangerously vulnerable: 3 quick (and scary) anecdotes

How secure are the data, applications, systems, and networks your business depends on? If you’re like too many of the executives I talk to, you may believe all is well — but only because you haven’t asked the right questions.

One executive told me recently, “We’re cool; we haven’t had to touch our firewalls in three years.”

Continue reading

Don’t let your firewall get burned by employees’ mobile devices

As more and more of your employees use mobile devices, these machines may start out behind your firewall — but they don’t stay there. They move around, to other networks with different firewall rules. Or no firewall at all.

When that mobile device returns to its trusted place behind your firewall, it may carry a cyber-infection that can attack your network from the inside.

The great firewall challenge lies in balancing the tradeoffs between degree of protection, usability, and cost. That balancing act starts with understanding what your firewall actually does.

Continue reading

Employee smartphones and tablets getting to be a huge administrative hassle?

If so, I’ve got good news: Now it’s easy to optimize mobile communications functionality and security while minimizing downtime.

Quest’s new Mobile Device Management Service will secure, monitor, manage, and support 50 to 5,000 mobile devices, regardless of whether these devices are company-owned or BYOD (bring your own device). The Service is available for virtually all smartphones and tablets, including: iPhone® / iPad®, BlackBerry®, Windows® Mobile, Palm™, and Google Android™ / Android™ Tablet.

Continue reading