Quest Technology Management

Helping clients manage their technology for over 30 years.

Help your clients get proactive about cybersecurity

Proactive about cybersecurity by Quest

In my previous post, I pointed to several top security threats your clients face in attempting to protect their data and systems.

Cyberthreats like app attacks, web attacks, social engineering exploits, and ransomware are only a few of your customers’ concerns. They must also (or will soon) contend with breaches that steal or corrupt huge swaths of “big data,” the risks of trusting IoT (Internet of Things) devices and sensors, and the dangerous vulnerabilities of industrial control systems.
Continue reading

4 security vulnerabilities your clients should look out for

Security Vulnerabilities by Quest

Security vulnerabilities tend to stick around. SQL injection, for instance, has been a popular means of exploiting databases for years and remains a significant cyber threat.

As we respond by adapting and fortifying our security defenses, however, cyberattack targets tend to shift — so it’s essential to understand the ever-changing nature of your clients’ risk landscape.

These days, your clients need to be aware of several ways that cybercriminals are likely to threaten their operations:

Continue reading

Hybrid cloud as an innovation infrastructure: 8 best practices

Hybrid Cloud Innovation by Quest

Much of the appeal of cloud services lies in their ability to mask the complexity of the information technologies we all depend on.

Thus, as your clients’ employees sign on to public clouds, their IT staffs must respond with hybrid cloud solutions that address the resulting shadow IT, security, and compliance issues.

Continue reading

Your clients have Shadow IT — and Hybrid Cloud can help

Shadow IT - Hybrid Cloud by Quest

Ever ask your clients how many public cloud services they use? Odds are the number is higher than even the most senior tech guy knows.

In fact, the appeal of low-cost, easy-to-use, feature-rich public cloud services is so universal that by 2020, cloud will claim two-thirds of all IT infrastructure, software, services, and technology spending. By then, cloud-related communication will account for more than 80% of total data center traffic.

Continue reading

Turning networking hassles into a network services strategy

8 IT Tips for Better Customer Resilience

In my last post, I pointed out the sorts of pressures today’s competitive needs place on your customers’ network services — hassles related to application workloads, network performance, security, compliance, and more.

At first glance, these may seem like patchwork problems to be addressed with patchwork solutions. But they may also signal deeper issues that, with a closer look, bring you face to face with the (often legacy) limitations of your customer’s data network.

Continue reading

Protect the Base: Network Support

Network Support by Quest

As cloud and managed services play a larger and larger role in your customers’ IT operations, the state of their network services, which underpin these more visible cloud and managed services, is likely to become an issue — if it hasn’t already.

After all, your customers’ networks must accommodate new business-essential demands like secure application delivery, mobile user access, and end user authentication. These demands on networks often designed for earlier eras with earlier technologies can trigger problems related to network performance, application workloads, security and compliance, monitoring and management, and, as always, cost.

And when that happens, your customers will be calling you seeking a right-now-hurry-up fix.

Continue reading

Quest Partner Playbook: for when your customer needs extra help

Partner Playbook by Quest

In the industry of business technology, your customer relationships are crucial to your success. But to “land and expand” often means integrating capabilities or solutions that your organization may not cater to.

So what do you do when you’ve won a customer project that stretches beyond your current comfort zone, and you’re not sure you’ll be able to deliver?

Head to the Quest Partner Playbook – your go-to resource for those moments when you don’t want to leave a customer hanging, but still need a game plan for options and next steps.

Continue reading

Meet Do-it-Yourself Dave… He does it all!

When it comes to technology, you and I both know that it’s best to let the experts take the lead. Your customers, well-intentioned though they may be, may disagree—and not to their benefit. Do you have a “Do-it-Yourself” client?.

With thousands of different brands that are not always compatible, millions of different configurations, and innumerable ways a network can be compromised, your customers’ technology should not be a DIY job.

Continue reading

8 IT Tips for Better Customer Resilience

8 IT Tips for Better Customer Resilience

Have you noticed how customers are talking more about risk these days? Not surprising, given the spectacular nature of recent hacks and immobilizing disasters. Yet, all forms of risk that threaten your customers’ environments and reputation are only part of a much larger problem which you can help resolve. Begin by strategizing with your customers using these key tips:

Continue reading

Clarity with Cloud Providers

Two dice with all faces saying "win" to illustrate a win-win situation

How are your customers planning for their migration to the Cloud? Can they compare Cloud pricing and solutions using their REAL infrastructure data? Can your customers compare against actual performance issues? Can they identify the appropriate workloads to move? Can your clients test their workloads in the Cloud? Do they have an infrastructure performance profile for their workloads? Can your customers visualize application and server dependencies of workloads?

Most businesses do not or cannot get these things today. Visibility is the key to accurate planning with your customers.

Quest’s CloudScape Assessment can set you apart from the crowd, by answering all of the questions above.

Continue reading