Helping clients manage their technology for over 30 years.

Apps, Apps Everywhere — But How Secure Are Yours

Did you know that your applications are the most vulnerable part of your IT operations?

iPhone with lock to symbolize Cloud Security. Cloud in background

These days, problems with apps — many of them web-based apps — account for the majority of information security breaches. Over the last year or so, and going forward, application-level attacks have emerged as the preferred vector for gaining access to sensitive (and valuable) data. What’s more, the threats are becoming increasingly acute as complex web apps, as well as mobile apps, play ever greater roles in our business and personal activities.

App vulnerabilities for sale — cheap at the price? Continue reading

A Glimpse of What’s on the 2014 Tech Horizon …

Four dice showing 2013. Last die is rotating from 3 to 4 for 2014

As 2013 comes to a close, it’s time to look ahead, and a good place to start is Gartner’s top ten strategic technology trends for 2014, which point to an accelerating velocity of change that we ignore at our peril:

Continue reading

Fast, cheap connectivity opens up network/application management options

3 smart phones

As 2013 begins, I notice plenty of commentary about mobile devices but less talk about the implications of mobility and other current events on business network and application monitoring and management requirements.

I see two key trends impacting network and application monitoring and management in the coming year: Fast, cheap connectivity and virtualization/cloud services. In this post, I’ll focus on the first of those — connectivity, which is most apparent in the current push toward (you guessed it) mobility.

Chicken or egg: Mobility ↔ connectivity
These days, your employees’ desktop functions are shifting to increasingly powerful mobile devices. At the same time, cloud services make the connectivity of those devices pretty much ubiquitous. So the value of much of your traditional infrastructure diminishes because it costs too much, is too complex, takes up too much space — and, too often, it doesn’t get the job done anymore.

Continue reading

How safe are your apps?

Key icon to represent security

A recent report by Forrester Consulting suggests your web applications may be far more vulnerable than you think. According to Forrester, 51% of the 240 North American and European companies surveyed experienced at least one application security incident since the beginning of 2011. And 18% of those suffered losses of at least $500,000. For 8% of those surveyed, losses topped $1 million.

Continue reading

What is the role of security in application development?

Unlock the Keys to Application Development

The majority of developers are not security experts, and secure coding is historically not identified as a priority. Oftentimes, the arduous task of vulnerability identification and remediation cannot be successfully addressed by limited IT security resources.

Look for an app development services provider who offers a time-saving solution for all types of security testing — outsourced, individual, and enterprise-wide analysis — and for all types of users, including application developers, build managers, Quality Assurance (QA) teams, penetration testers, security auditors, and senior management.

Continue reading

And now for the how of developing web and mobile apps

mobile application development icons

As I pointed out in my last entry, the ability to field web and mobile applications is quickly becoming a business necessity for even small enterprises.

If you’re lacking the substantial developer expertise needed to accomplish that — and most smaller and midsize organizations are — than your best option is to search out an accomplished web/mobile app development services provider.

Continue reading

The why and how of developing web and mobile apps — first, the why (and just a teeny bit of how)

Need for Developing Mobile and Web Based Apps

The numbers are more than impressive: 4.8 billion mobile handsets currently in use — and 19% of those are smartphones, up 2% from just last year.

Then there’s the Internet, which now claims some 2.2 billion users, 1.3 billion of whom access it via some sort of personal computer (desktop, laptop, ultrabook, netbook, tablet).

Continue reading

Are the applications you use endangering your business? A look at the solution

Application security scan

Hackers have many ways to exploit even the smallest vulnerabilities in your application environment and too often you’re compromised even before you grasp that there’s a problem.

Fortunately, it doesn’t have to be this way. The solution is an application security scan conducted by a services provider adept at dealing with issues related to application development, support — and, of course, security.

Continue reading

Are the applications you use endangering your business? A look at the problem

application security

With all the security your IT operations (should) have, you’d think this question would be moot — but it isn’t. The applications your business and your employees rely on could be time-bombs poised to destroy your ability to function.

That’s because the vast majority of applications used in business today are connected to the Internet, often in a variety of ways.

Continue reading

A closer look at application support services — part 2 of 2

Time to evaluate your App Development services provider

Besides application security testing — which I’ll be taking a closer look at next time — I want to focus now on three capabilities that can make all the difference when it comes to getting the most from an application support services provider:

  1. Database performance and stability monitoring
  2. Beta and test environment architecture, and
  3. Documentation solutions

Continue reading