Quest Technology Management

Helping clients manage their technology for over 30 years.

Cybersecurity best practices:
Remember the basics + 3 strategies

technological complexity by Quest

In my last post, I described people-focused cybersecurity best practices to share with your clients. This time, I’m adding some key cybersecurity best practices basics as well as three essential cybersecurity strategies.

Continue reading

7 employee-focused ways your clients can defend against ransomware

technological complexity by Quest

As ransomware goes, WannaCry spread spectacularly far and fast, aiming at enterprises more than consumers – but with meager effect on many, thanks to data backups.

Kudos for all those IT people who take their data backup duties seriously!

Continue reading

Making your clients’ networks smart enough

technological complexity by Quest

The software-defined, self-optimizing network architecture that ’s so essential to your clients ’ ability to stay in business demands intelligence across the entire network – not just your clients ’ network core but their network edge, too.
Continue reading

Help your clients keep their customers happy – with an enterprise network transformation

technological complexity by Quest

Do your clients pay attention to customer experience? If not, they certainly should.

Several studies point to how poor customer experiences in multi-channel, mobile, and self-service interactions negatively impact buying decisions. And no wonder – by 2020, 85% of a typical customer’s interaction with an enterprise will not involve a human being. Continue reading

Help your clients master technological complexity with cloud-aware managed/hosted services

technological complexity by Quest

If your clients’ organizations are typical, they’re now using multiple cloud services – an average of five if they’re small or mid-sized, 18 if they’re large.

But while today’s hyperscale public cloud environments can often provide important capabilities far more effectively than in-house IT infrastructure, your clients may not quite realize that the data and applications they place in those clouds are theirs – not the cloud providers’. Continue reading

Cloud best practices that strengthen security and performance

Strengthen Security and Performance by Quest

As I mentioned in my last post, organizations increasingly use multiple cloud services and hybrid clouds.

Boosting cloud security with infrastructure and standards

Cloud services providers are also deploying new cloud technologies like automation, microservices, containers, and so on, that boost cloud performance and make public cloud services as secure, or even more secure, than traditional on-premises environments.
Continue reading

3 trends, 4 new technologies Driving the multi-cloud world

3 trends, 4 new technologies Driving by Quest

On average, the typical cloud user leverages six clouds. It’s no surprise, then, that 80% of enterprise IT organizations will commit to hybrid clouds this year.

Chicken or egg?

Which comes first – customers embracing new technologies or new technologies created in hopes of attracting new customers? Either way, your customers face three inescapable trends:

Continue reading

IT resilience and business recovery:
6 capabilities and how to deliver them

IT resilience and business recovery by Quest

In today’s complex, always-on business world, your customers’ business resilience depends on achieving and sustaining IT resilience. This means ensuring continuous availability of all business processes, workflows, technologies, and policies regardless of where your customers’ IT environments reside, what’s in them, or how they change over time.

Continue reading

When downtime strikes

Proactive about cybersecurity by Quest

Lurking behind many downtime incidents are mundane causes – a failed UPS, human error, a malfunctioning component.

But increasingly, your clients will discover downtime causes stemming from a class of culprits best characterized as IT complexity.

Continue reading

4 security vulnerabilities your clients should look out for

Security Vulnerabilities by Quest

Security vulnerabilities tend to stick around. SQL injection, for instance, has been a popular means of exploiting databases for years and remains a significant cyber threat.

As we respond by adapting and fortifying our security defenses, however, cyberattack targets tend to shift — so it’s essential to understand the ever-changing nature of your clients’ risk landscape.

These days, your clients need to be aware of several ways that cybercriminals are likely to threaten their operations:

Continue reading