Helping clients manage their technology for over 30 years.

Disruptive technologies:
Coming soon to an industry sector near you

Disruptive Technologies by Quest

Anyone familiar with Uber or Airbnb will agree that well-deployed disruptive technologies can be dramatic and industry-upending. Even so, if your business earns its living far from such events, you may think you have years yet before needing to deal with “anything like that.”

You might want to think again, however. This season’s analyst predictions about 2016* stand out for their warnings about the reach and speed of disruptive technologies.
Continue reading

How app dev puts business at risk — and what to do about it

In a recent survey, 43% of IT decision makers rated mobility — which is to say, mobile-friendly apps or sites — as the top business functionality or process that’s critical for applications. These days, the line between the web and mobility has blurred to the point of invisibility.

Trouble is, successfully achieving secure mobile application development and web application development is hard for a significant majority of organizations.
Continue reading

New app dev challenges in 2015 — Are you ready?

mobile app development challenges

Regardless of the sector in which your business operates or its size, conducting mobile and web application development has never been more important – because it’s never had more of a competitive impact.

It’s not without challenges, however. That’s because application development software technologies and IT environments change quickly, and app dev itself has never been more complex. Keeping up is tough and getting tougher.
Continue reading

Conquering Cybersecurity Problems: Managed IT Services Can Help

Managed Security Service Provider - Quest

In my last post, I described some of the key ways Managed IT Services help monitor networks and applications, conduct real-time analysis of security alerts, and streamline management of security reporting and policy compliance.

Important as these Managed IT Services are, however, the IT-centric capabilities they provide are just part of a larger IT security picture. Unquestionably, these capabilities are necessary, but they are by no means sufficient – especially if your goal is (as it should be) to create and sustain multiple security layers that are proactive and preventive. Continue reading

8 Best Practices to Develop a Business Resilience Strategy

Resilience concept illustrated by a blue arrow made of balls

According to Gartner, by 2020 60% of businesses will suffer major service failures due to mismanagement of risk in new technology and use cases. This is why, in my last post, I suggested that the best way to deal with these risks is to commit to a strategy of resilience — “the capacity of an organization to plan for and adapt to change or disruption through anticipation, protection, responsive capacity, and recoverability.”

To get a sense of a resilient business in 2015, let’s start with where you want to end up.

Continue reading

A Forward Look: Riding the Digital Waves of 2015

Concept of divergence with branching arrows

At year’s end, I always find myself looking back over the previous 12 months and then, inevitably, I can’t help but look forward to the coming year. Since I’m in the information technology business, this exercise can be pretty interesting.

Technology trends translate into products and services that matter, but when you hear about technologies like web-scale IT, cloud bursting, advanced analytics, self-aware apps, context-rich systems, software-defined networks, etc. – well, it’s hard to keep your eyes from glazing over. So I’ll narrow it down to two waves coming at all of us: Continue reading

Keep Your Guard Up During the Holidays

Yellow sign with exclamation point

The holiday season is upon us – which means it’s also cyberattack season. Though, arguably, 2014 has turned into an entire year of the cyberattack: one study estimates 2014 will rack up an incredible 42.8 million cyberattacks worldwide. That’s more than 117,000 attacks every day!

Which leads me to the topic of firewalls. It’s been 20 years since the first firewalls were deployed to make a perimeter gateway barrier blocking unwanted IP traffic.

Since then, firewalls have evolved to keep pace with new technologies, the ever-increasing complexities of network infrastructures and applications, and new business models that have spawned things like cloud computing and mobile apps. These days, companies deploying firewalls and advanced perimeter controls see a 15% return-on-investment. Continue reading

Giving Thanks During the Season of Patching

Abstract concept of patching

As the nights grow longer and colder, giving thanks for all that’s warm and light-filled makes wonderful sense. We are, in effect, expressing appreciation for feeling secure and safe.

In fact, this is a time of year when it’s a good idea to pay particular attention to security — especially data security. With the season of holiday gift-buying underway, opportunities for data thieves, hackers, and malware abound.

This isn’t only a concern for retailers and credit card firms. We’re all vulnerable and we all have to continually tend to the security of our businesses.  Continue reading

Planning for 4 Key 2015 Technology Challenges

Colleagues making a plan

Four technologies will very likely impact your business in 2015 — whether or not you explicitly consider them in your planning. Which is to say, ignore them at your peril:  Continue reading

3 Steps to Closing the BYOD Gap

BYOD Policy – BYOD Gap

In my last post, I discussed the gap between business units that enthusiastically embrace BYOD and IT departments, where BYOD is regarded with more hesitation.

Yet it’s clear: BYOD is not only here to stay, it is quickly becoming a dominant force that IT departments must deal with. And in most circumstances “just say no” isn’t an option; BYOD offers employees too many rich opportunities to boost productivity, innovation, and collaboration.

So what’s an IT department — your IT department — to do? Continue reading