Quest Technology Management

Helping clients manage their technology for over 30 years.

7 business continuity strategy best practices

 business continuity strategy best practices

If (when?) your clients express skepticism about the risks their business faces, you might try offering up these numbers:

  1. Cyberattacks that target businesses nearly doubled between 2016 and 2017, driven by an enormous spike in ransomware, including ransom denial-of-service (RDoS) attacks. Result: overall, the cost of a cyberattack has increased more than 27% from 2016 to 2017.

  2. 2017 was the most expensive year on record for natural disasters, due in significant part to extreme weather events across the U.S. that caused a total of $306 billion in damage. Last year saw 16 separate billion-dollar events, including three tropical cyclones, eight severe storms, two inland floods, a crop freeze, drought, and wildfire.
Continue reading

9 best practices to boost your clients’ enterprise network performance

 IT Talente by Quest

For your clients to attain the network performance their enterprises need, point them to these nine best practices:

1      Plan for continued bandwidth growth
Your clients will need to prepare for 5G mobility, the internet of things (IoT), video conferencing, collaboration tools, etc. — all of which will accelerate bandwidth demand.

Continue reading

Enterprise network performance challenges and the technologies that can help

 IT Talente by Quest

Do your clients strain to keep their data networks at the performance levels necessary to stay competitive?

Four network performance challenges
Your clients may be facing one or all of these:

1   More data traffic and faster, too. Annual global IP traffic is increasing by 24% per year and will hit 3.3 zettabytes (3.3 trillion gigabytes) by 2021, when broadband speeds will have nearly doubled.

Continue reading

Helping your clients toward IT resilience

 IT resilience by Quest

Now that a hefty majority of enterprise systems, applications, and workloads are considered mission- or business-critical, discussions about business continuity and disaster recovery focus on IT resilience architectures employing multiple geographically-distributed data centers that use live application failover to prevent downtime.
Continue reading

Ecosystem or Feudal System?

Game of Thrones playing on iPad

Game of Thrones recently kicked off its fourth season. And as a devoted fan, I cannot help but see the similarities between the battle for control of Westeros, the Iron Throne and the capital city, King’s Landing and the current gamesmanship developing in the IT Channel for control of the end-user experience, the IT infrastructure backbone, and the datacenter.

Much like the Channel, Westeros the fantasy realm of the HBO hit show, Game of Thrones, is made up of different families and kingdoms. For those who remember their Western Civilization courses, it is basically a feudal system under the mercurial rule of a corruptible monarchy, bordered on the north by snow zombies and hordes of non-allied “wildlings” and to the south east by dragons and a very angry ex-pat, who is raising an army to kill everyone back home.

Continue reading

Capitalizing on Quest’s Investments

Hand drawing arrows on glass. All the arrows are pointing to the left except one point up. Stand out from the crowd.

With Cloud adoption growing at an incredible rate, leverage the strengths of Quest’s expanding footprint and Cloud services portfolio to extend the value you provide customers and increase your sales.

 Stand out from the crowd

Drive more monthly recurring revenue by integrating Infrastructure as a Service, Desktops as a Service, Disaster Recovery & Business Continuity and Co-location services into your customer opportunities with  Quest’s recent 120K sq. ft. facility in Roseville, CA and expanding network of global Service Delivery Centers. Continue reading

Ear Holed

American football player against a Cloud background. Talk to your clients about the Cloud or you might get ear holed.
Football games are as much a part of Thanksgiving as turkey, mashed potatoes and pumpkin pie. In football, there’s a term called getting “ear holed”. For those who have never played the greatest sport in America, the best definition I can provide is as follows: Ear Holed: A player being tackled/blocked from the side, leaving ones feet and potentially losing consciousness momentarily, without warning or seeing the hit coming. If you’re more visually inclined, check out this video clip. I think we can all agree no one wants to be #10 from Wisconsin in that moment. Continue reading

Project Crunch

Chalkboard full of business terms relating to project management and motivational topics.
It is that time of year again. The seasons are changing, the days are getting shorter and the end of the year is fast approaching. Customers are wrapping up projects, closing out budgets and starting to plan operations for the New Year. Procurement decisions have been made and the project cycle will continue into the winter. Continue reading

Security Risk and Reward

informationSecurity
Market experts love to talk about Information Security. And why wouldn’t they?! It is a beautiful market of evolving requirements and according to a new report by Global Industry Analysts, it’s projected to surpass $125 billion by 2015. Market research and revenue projections aside, what does the growing need for security practices at all levels mean for the Channel? What does it mean to the SMB space? Even large enterprises get breached, and they’ve invested billions of dollars in information security and have CIO’s and Directors overseeing teams of security admins, network security professionals, and quality control processes for application delivery. Threats can come from any level, Cisco projects that 50 billon devices will be connected to the Internet of Everything (IoE) by 2020. Applications, email, networks, remote workers, Cloud hosted databases. If your clients’ business has touched the internet, it’s likely that automated malware and botnets are searching their systems for vulnerabilities. The motives behind these infected emails, watering hole attacks and zero day threats are not always known until it is too late. Corporate databases are breached, users personally identifiable information (PII) is lost and regulators penalties and damaged consumer confidence is inevitable. Continue reading