Ian Barker

Intelligent sales productivity platform from Base adds new features

Telesales

Many businesses rely on CRM tools to store sales data, but the increased use of mobile devices has led to new demands for information to be available anywhere at any time.

Now Base which describes itself as an intelligent sales productivity platform, has added a range of new features to boost team productivity and make data available in real time.

Continue reading

Mobile security budgets aren't keeping pace with demand for devices

mobile-security

Although mobile devices are becoming essential in many workplaces security budgets are failing to reflect the growing numbers of devices that need protection.

This is among the findings of a new report by electronics and systems specialist Raytheon. According to the research around one-third of employees use mobile devices exclusively to do their work and this is expected to increase to an average of 47 percent of employees in the next year.

Continue reading

How to keep yourself safe from hacking [Q&A]

login password identity

As we all carry out more of our day-to-day transactions online and access the internet through a wider range of devices, we're opening ourselves up to greater potential risk.

Add in the constant battle of security providers to stay ahead of hackers and malware writers and it's easy to doubt if you can ever stay truly safe online. Joe Siegrist CEO of password management specialist LastPass thinks that although it's not 100 percent possible to hack-proof yourself, you can significantly reduce your risk, we spoke to him to find out how.

Continue reading

Virtual reality is coming to the workplace and it may be sooner than you think

virtual-reality

Not so very long ago virtual reality was the stuff of science fiction but it's increasingly emerging into the real world.

A new infographic produced by collaboration specialist PGi explores the current state of virtual reality and the possibility that it will soon be appearing in the world of work.

Continue reading

The best CRM software as selected by business professionals

CRM

By allowing companies to track and manage customer interactions, CRM (customer relationship management) systems are key to the success of sales and marketing teams. There are a lot of alternative systems to choose from though which can present a problem when it comes to picking the best option for the needs of a particular enterprise.

In order to help with this business software user review site G2 Crowd has produced its regular Grid report ranking 27 different CRM systems.

Continue reading

What makes Apple such a success? -- Free ebook

2013 Apple MacBook Air Illuminated Logo

Love it or hate it, you can't deny that Apple is a phenomenally successful company. But how has it managed to achieve this from a business that started in a garage?

Mostly it hasn’t been by innovation but by taking technology that already existed and turning it into the devices that people want to buy. Apple, more than any other company, has succeeded in making technology cool and desirable.

Continue reading

Datastickies and the rebirth of the cassette -- the future of data storage

Cassette tape

Remember when floppy disks really were floppy? Or the joys of loading programs on a home computer from a C15 cassette? In just over 40 years storage technology has gone from these crude devices to cloud servers that put terrabytes of space in reach of anyone.

But where does the future lie? Hardware supplier Ebuyer has produced an infographic looking at the direction storage may take in the future.

Continue reading

Internet users say they want privacy but behave like they don't

Privacy

We all say that we want privacy and security online, yet we indulge in potentially risky behaviors that put this in jeopardy according to a recent study commissioned by Trend Micro and released to coincide with the launch of its Internet Security 2015 product.

Activity like browsing suspect websites and allowing apps to access public information from their social media profiles puts people’s privacy at risk. Also 67 percent of people let their browser save passwords for websites. Trend Micro says saving passwords leaves them susceptible to being hacked, especially in light of recent retail security breaches.

Continue reading

PagerDuty delivers advanced reporting and visualization

Data graph report

Monitoring of IT systems is only effective if you're able to interpret the data you collect and act on it in a timely manner. This is especially true when it comes to resolving incidents.

Operations performance management company PagerDuty is launching new advanced analytics tools to provide IT teams with insights into team and system performance. Using operational metrics like incident frequency and time taken to respond and resolve, companies can now drive even faster incident resolution. At the same time it gives managers the opportunity to understand and improve the key factors that drive uptime.

Continue reading

New Dell partnership strengthens enterprise risk management

Insider threat

In the event of a major problem, whether it's a cyber attack, political unrest or a natural disaster, getting critical information to the right people in a timely manner is crucial.

To address this, Dell Software has formed a partnership with enterprise risk visualization software company, IDV Solutions to integrate Dell's AlertFind enterprise notification solution with IDV's Visual Command Center. The combined product will give companies the ability to monitor and respond to security threats by enabling communication with affected employees when a risk occurs (via email, text, voice, pager or fax) and track real-time status of message recipients to know who has responded and who may require assistance.

Continue reading

PaaSLane 2.5 release adds new capabilities for cloud developers

cloud

The PaaSLane tool for assessing the cloud-readiness of applications has been available for two years and has helped many organizations transition their software smoothly. It's able to detect outdated architecture, weak security, platform issues and more.

Now Cloud Technology Partners has brought out a new release to allow Java and .Net developers to assess and optimize their source code for the cloud more quickly and efficiently.

Continue reading

Cisco adds threat focus to its firewall platform

Cisco ASA 5500

The firewall is usually the first line of defense for any network, but most offerings are focused on access policy and application control which makes it hard for them to respond to zero-day and more advanced attacks.

Now networking company Cisco is launching what it calls the first threat-focused Next-Generation Firewall (NGFW). Cisco ASA with FirePOWER Services provides the contextual awareness and dynamic controls needed to automatically assess threats, correlate intelligence, and optimize defenses in order to protect networks.

Continue reading

Riak Enterprise 2.0 enhances NoSQL database usability

Business database server

For organizations that deal with large quantities of data, the NoSQL database is a popular choice. However, it can present problems for traditional database programmers.

For this reason developers are always on the look out for ways to build applications more easily and unlock the potential of unstructured data. With the release of its latest Riak Enterprise 2.0, NoSQL specialist Basho is addressing these needs.

Continue reading

IT professionals not confident they can prevent cyber attacks

security padlock

Despite the number of high profile attacks in recent months, many organizations are still lacking confidence in their ability to prevent a cyber attack or data breach.

These are the findings of a new survey from risk consultancy firm Protiviti which also shows that companies aren't properly preparing for crises and often don’t have adequate core data policies.

Continue reading

Over three-quarters of mobile apps will fail security tests by 2015

mobile security

New research by analysts at Gartner shows that more than 75 percent of mobile apps are set to fail basic security tests by 2015.

This is a particular worry for enterprises as employees may download software from app stores. These apps offer minimal or no security assurances but are able to access sensitive business data and violate company security policy.

Continue reading

Ian's Latest Tweets

© 1998-2014 BetaNews, Inc. All Rights Reserved. Privacy Policy.