Helping clients manage their technology for over 30 years.

The new look of enterprise networks – virtual, automated, cloudy, and smart

Enterprise Network by Quest

As I noted in my last post, the success of most enterprises increasingly depends on the ability to deliver a positive customer experience online – an experience that relies on reliable, high-performing digital network architectures with several key capabilities:
Continue reading

What to look for in a cloud-aware managed/hosted services provider

The cloud in 2017: 3 trends by Quest

Choosing the right managed/hosted services provider for your organization can be tough because what such providers offer – and how they deliver – can vary greatly.
Continue reading

The value of adding managed/hosted services
as you reach for the clouds

The cloud in 2017: 3 trends by Quest

If your organization is like most others, it’s using plenty of cloud services – an average of five if yours is a small or mid–size operation, 18 if it’s large.

After all, maintaining in-house IT infrastructure drains valuable time, effort, and management bandwidth for the sake of capabilities that today’s hyperscale public cloud environments can provide far more effectively.
Continue reading

The cloud in 2017: 3 trends to watch out for

The cloud in 2017: 3 trends by Quest

In this age of the restless customer – not merely digital-centric but also “adventurous, experimental, and downright fickle” – I notice three crucial cloud-shaping trends:

1   The shadow IT underground

Business units everywhere buy cloud services without IT department approval in a mass decentralization of IT “authority.”

Why? Because these cloud services help business units stay competitive, responsive, and innovative at a time when 40% of consumers have expressed “a high willingness and ability to shift spend,” and another 25% are leaning that way.
Continue reading

How safe are your apps?

Key icon to represent security

A recent report by Forrester Consulting suggests your web applications may be far more vulnerable than you think. According to Forrester, 51% of the 240 North American and European companies surveyed experienced at least one application security incident since the beginning of 2011. And 18% of those suffered losses of at least $500,000. For 8% of those surveyed, losses topped $1 million.

Continue reading

What is the role of security in application development?

Unlock the Keys to Application Development

The majority of developers are not security experts, and secure coding is historically not identified as a priority. Oftentimes, the arduous task of vulnerability identification and remediation cannot be successfully addressed by limited IT security resources.

Look for an app development services provider who offers a time-saving solution for all types of security testing — outsourced, individual, and enterprise-wide analysis — and for all types of users, including application developers, build managers, Quality Assurance (QA) teams, penetration testers, security auditors, and senior management.

Continue reading

The Dangers Confronting Data in Motion

visual depiction of data files flowing through a desktop computer

Last time, I looked at some of the security issues related to employee mobility, which focused mainly on devices like smartphones and tablets and how people use them.

But smartphones and tablets aren’t the only mobile devices business leaders need to worry about. Consider:

  • USB malware is gaining momentum — so flash drives and other USB-connected devices can become malware vectors.
  • Hackable RFID and radio frequency channels create voicemail vulnerabilities and enable call interception.
  • RAM scraping exploits moments when sensitive encrypted data is unencrypted in browsers, smartphones, point-of-sale system memory, etc.

Continue reading

The Dark Side of Employee Mobility

Closeup of woman entering information on her mobile phone.

Late last year, market researcher IDC reported that by 2015 more U.S. Internet users will access the Internet through mobile devices than through PCs or other wireline devices. Judging by the eager embrace of smartphone and tablets since then, I’d guess their prediction may be conservative.

And unquestionably, this kind of mobility in business is a game-changer both in terms of how we do business and how we do information security.

Continue reading

Think it can’t happen to you? Think again

Target with a cluster of bullet holes around the bulls eye.

Two kinds of security threats have emerged of late that need special attention, even if you’re running a small enterprise: Targeted zero-day attacks and advanced persistent threats.

Targeted zero-day attacks
Microsoft’s recent Internet Explorer security flaw (see my last blog post) is a fine example of a zero-day attack. The attackers got their edge from speed, since reactive countermeasures that depend on threat signatures — such as patching and tools like antivirus software and intrusion prevention — couldn’t be updated fast enough to halt the flaw.

Continue reading