Quest Technology Management

Helping clients manage their technology for over 30 years.

Help your clients get proactive about cybersecurity

Proactive about cybersecurity by Quest

In my previous post, I pointed to several top security threats your clients face in attempting to protect their data and systems.

Cyberthreats like app attacks, web attacks, social engineering exploits, and ransomware are only a few of your customers’ concerns. They must also (or will soon) contend with breaches that steal or corrupt huge swaths of “big data,” the risks of trusting IoT (Internet of Things) devices and sensors, and the dangerous vulnerabilities of industrial control systems.
Continue reading

4 security vulnerabilities your clients should look out for

Security Vulnerabilities by Quest

Security vulnerabilities tend to stick around. SQL injection, for instance, has been a popular means of exploiting databases for years and remains a significant cyber threat.

As we respond by adapting and fortifying our security defenses, however, cyberattack targets tend to shift — so it’s essential to understand the ever-changing nature of your clients’ risk landscape.

These days, your clients need to be aware of several ways that cybercriminals are likely to threaten their operations:

Continue reading

8 IT Tips for Better Customer Resilience

8 IT Tips for Better Customer Resilience

Have you noticed how customers are talking more about risk these days? Not surprising, given the spectacular nature of recent hacks and immobilizing disasters. Yet, all forms of risk that threaten your customers’ environments and reputation are only part of a much larger problem which you can help resolve. Begin by strategizing with your customers using these key tips:

Continue reading

On Security

Security spelled out underneath a padlock

I was visiting with a friend recently when the topic of Target’s security breach came up. We both had been part of the massive data breach and lost some of our banking information. We both had replaced our credit cards and that is where the similarities ended.

Although alarming as this latest breach was, it did not really impact my consciousness or my day-to-day consumer habits.  We live in a world where data is our identity and I have taken certain steps to secure myself and those I care about. Continue reading

Security Risk and Reward

Market experts love to talk about Information Security. And why wouldn’t they?! It is a beautiful market of evolving requirements and according to a new report by Global Industry Analysts, it’s projected to surpass $125 billion by 2015. Market research and revenue projections aside, what does the growing need for security practices at all levels mean for the Channel? What does it mean to the SMB space? Even large enterprises get breached, and they’ve invested billions of dollars in information security and have CIO’s and Directors overseeing teams of security admins, network security professionals, and quality control processes for application delivery. Threats can come from any level, Cisco projects that 50 billon devices will be connected to the Internet of Everything (IoE) by 2020. Applications, email, networks, remote workers, Cloud hosted databases. If your clients’ business has touched the internet, it’s likely that automated malware and botnets are searching their systems for vulnerabilities. The motives behind these infected emails, watering hole attacks and zero day threats are not always known until it is too late. Corporate databases are breached, users personally identifiable information (PII) is lost and regulators penalties and damaged consumer confidence is inevitable. Continue reading

How secure do your customers think they really are?

Man looking up at giant words like: Malware, Security, Cloud Services, Virus, etc.
These days, one of the biggest challenges your customers face is keeping their data, apps, and infrastructure secure from malware, hackers, and thieves. Quest can help you keep your customers safe and identify vulnerabilities that are often overlooked. With comprehensive state-of-the-art security capabilities, Quest has built the understanding that to be effective, security measures need to work together in awareness of each other. That’s why we customize, integrate, and fine-tune our security offerings to precisely fit your customers’ particular needs. Continue reading

Quest’s Global Network of Service Delivery Centers are Ready Right Now to Meet Your Clients’ Needs

Map of Quest's global network of Service Delivery Centers
When it comes to choosing a partner to help you meet changing client demands, you face some tough decisions. As I see it, you need three things to make a successful partnership:
  1. A partner who’s willing to share — i.e., when you make a sale, you get a piece of the proceeds, including a portion of ongoing revenue from Cloud service subscriptions.
  2. A partner with the right offerings — i.e., a solid bench of Cloud and other technology solutions that truly address your clients’ requirements.
  3. A partner who fields sufficient resources to reliably deliver what you’ve promised your clients — i.e., not merely strong technical experience/expertise but also a network of leading edge data centers specifically designed with the virtualization, automated management, and security capabilities.
Continue reading

When your customers want Cloud: Bring in the experts for free with a Quest Cloud Feasibility Assessment

With all the hype these days about Cloud computing, it can be easy to forget two very important facts:
  1. Not all Clouds are created equal. Different types of Clouds — say, public versus private versus hybrid — have different capabilities and limitations. What’s more, some Cloud providers do a better job than others of building the best Cloud infrastructure and maintaining an ability to customize it to meet customer requirements.
  2. Not all applications and data belong in a Cloud environment.
Continue reading