Quest Technology Management

Helping clients manage their technology for over 30 years.

7 employee-focused ways your clients can defend against ransomware

technological complexity by Quest

As ransomware goes, WannaCry spread spectacularly far and fast, aiming at enterprises more than consumers – but with meager effect on many, thanks to data backups.

Kudos for all those IT people who take their data backup duties seriously!

Continue reading

Making your clients’ networks smart enough

technological complexity by Quest

The software-defined, self-optimizing network architecture that ’s so essential to your clients ’ ability to stay in business demands intelligence across the entire network – not just your clients ’ network core but their network edge, too.
Continue reading

Cloud best practices that strengthen security and performance

Strengthen Security and Performance by Quest

As I mentioned in my last post, organizations increasingly use multiple cloud services and hybrid clouds.

Boosting cloud security with infrastructure and standards

Cloud services providers are also deploying new cloud technologies like automation, microservices, containers, and so on, that boost cloud performance and make public cloud services as secure, or even more secure, than traditional on-premises environments.
Continue reading

IT resilience and business recovery:
6 capabilities and how to deliver them

IT resilience and business recovery by Quest

In today’s complex, always-on business world, your customers’ business resilience depends on achieving and sustaining IT resilience. This means ensuring continuous availability of all business processes, workflows, technologies, and policies regardless of where your customers’ IT environments reside, what’s in them, or how they change over time.

Continue reading

When downtime strikes

Proactive about cybersecurity by Quest

Lurking behind many downtime incidents are mundane causes – a failed UPS, human error, a malfunctioning component.

But increasingly, your clients will discover downtime causes stemming from a class of culprits best characterized as IT complexity.

Continue reading

Force Multipliers:

Proactive about cybersecurity by Quest

Veterans can sometimes be like cross-fitters and vegans-if you haven’t figured out who they are in the first five minutes of speaking with them, they will most likely tell you within the next five minutes of your conversation. Take me for instance, I’m a clean-eating combat veteran with a respectable 4-minute Fran time myself. See what I did there? I hope you’ll give me a pass.

Continue reading

Help your clients get proactive about cybersecurity

Proactive about cybersecurity by Quest

In my previous post, I pointed to several top security threats your clients face in attempting to protect their data and systems.

Cyberthreats like app attacks, web attacks, social engineering exploits, and ransomware are only a few of your customers’ concerns. They must also (or will soon) contend with breaches that steal or corrupt huge swaths of “big data,” the risks of trusting IoT (Internet of Things) devices and sensors, and the dangerous vulnerabilities of industrial control systems.
Continue reading

4 security vulnerabilities your clients should look out for

Security Vulnerabilities by Quest

Security vulnerabilities tend to stick around. SQL injection, for instance, has been a popular means of exploiting databases for years and remains a significant cyber threat.

As we respond by adapting and fortifying our security defenses, however, cyberattack targets tend to shift — so it’s essential to understand the ever-changing nature of your clients’ risk landscape.

These days, your clients need to be aware of several ways that cybercriminals are likely to threaten their operations:

Continue reading

Turning networking hassles into a network services strategy

8 IT Tips for Better Customer Resilience

In my last post, I pointed out the sorts of pressures today’s competitive needs place on your customers’ network services — hassles related to application workloads, network performance, security, compliance, and more.

At first glance, these may seem like patchwork problems to be addressed with patchwork solutions. But they may also signal deeper issues that, with a closer look, bring you face to face with the (often legacy) limitations of your customer’s data network.

Continue reading

Protect the Base: Network Support

Network Support by Quest

As cloud and managed services play a larger and larger role in your customers’ IT operations, the state of their network services, which underpin these more visible cloud and managed services, is likely to become an issue — if it hasn’t already.

After all, your customers’ networks must accommodate new business-essential demands like secure application delivery, mobile user access, and end user authentication. These demands on networks often designed for earlier eras with earlier technologies can trigger problems related to network performance, application workloads, security and compliance, monitoring and management, and, as always, cost.

And when that happens, your customers will be calling you seeking a right-now-hurry-up fix.

Continue reading