Articles about Enterprise

Improving visibility into end-user computing [Q&A]

endpoint data

In the wake of the coronavirus pandemic we've seen greater focus on workplace flexibility with many employees being in the office for fewer days each week.

But to make this work, enterprises must be able to track the state of their end-user computing to understand their access, performance and user satisfaction.

Continue reading

Enterprises hang onto mainframes as migration strategies shift

Black and white mainframe

A new report suggests that faced with mounting competition and economic uncertainty, 92 percent of global enterprises are changing course to retain mainframes as part of pragmatic hybrid strategies, rather than pursuing wholesale cloud shifts.

The latest Mainframe Modernization Business Barometer Report from Advanced, based on a survey of 400 IT leaders worldwide, reveals hybrid infrastructure strategies taking hold to balance workloads across cloud and mainframe. In fact, only six percent expect outright mainframe replacement anytime soon.

Continue reading

The ERP challenges that are keeping security teams up at night [Q&A]

Data is the lifeblood of modern business and enterprise resource planning (ERP) systems are where it's likely to live. ERP software integrates data and business functions across departments like finance, manufacturing, marketing, sales and more, and of course this makes it an attractive target for cyber criminals.

So what threats do ERP systems face and what can enterprises do to defend against them? We spoke to Kellie Synder, CCO of Onapsis, to find out.

Continue reading

Enterprise search through terabytes: Why your findings will surprise you

data search

You know that game where kids dive to the bottom of a pool to pick up toys? It is hard to see what the toys are when they are sitting there on the floor of the pool. It’s only when the kids fish them out of the water that it becomes clear what each toy really is.

It’s the same thing with data. It’s not humanly possible to read through terabytes of text in a few sittings. But let’s say you try. You can retrieve email after email in an email reader, "Office" file after "Office" file in each’s native application, and still miss something that enterprise search can reveal.

Continue reading

In a hybrid world, enterprises need 'always-on' endpoint management

Endpoint protection

In the era of hybrid work, endpoints act as the nerve center of business operations -- distributed across multiple locations and networks. While this has bolstered employee productivity and flexibility, the shift has also increased IT challenges, and the exposure to cyber threats targeting remote employees. As the workplace evolves, security must too. To minimize cyber risk and navigate compliance, it’s up to IT teams to intensively monitor, safeguard, and manage employee devices.

As the world of work continues to transform, IT departments are facing increasing demands, compounded by a shortage of skilled staff. They must find ways to boost their operational efficiency. In response, organizations are turning to always-on endpoint management. This approach ensures continuous oversight and control, which is vital as organizations shift to global digital workforces.

Continue reading

Privacy fears lead enterprises to ban GenAI use

Stop

New research reveals that that most organizations are limiting the use of generative AI over data privacy and security issues, and 27 percent have banned its use, at least temporarily.

The study from Cisco surveyed 2,600 privacy and security professionals and finds that among concerns cited are threats to an organization's legal and Intellectual Property rights (69 percent), and the risk of disclosure of information to the public or competitors (68 percent).

Continue reading

New resource helps enterprises prepare for post-quantum security

Cybersecurity company Thales is launching a first-of-its-kind Post Quantum Cryptography (PQC) Starter Kit in collaboration with Quantinuum, aimed at supporting enterprises in their transition to a post-quantum era and helping them understand the implications that quantum computing will have on the security of their infrastructure.

While 73 percent of organizations recognize quantum computing poses a threat to traditional cryptography, 61 percent have yet to define a strategy for a post-quantum world.

Continue reading

Enterprise digital infrastructure expected to shift to subscription models

Future-network

By 2026, 80 percent of new enterprise digital infrastructure investment is forecast to be operated through a subscription-based model.

The Global Interconnection Index (GXI) 2024, released today from Equinix, predicts that in order to meet the ever-growing demands of data-dense technologies such as AI, 5G and edge computing, IT decision-makers are increasingly shifting away from long-term purchases of physical equipment, such as servers, routers and storage arrays, in favor of flexible subscription-based models.

Continue reading

How 5G is set to transform the way businesses connect [Q&A]

5G circuit board

The rollout of 5G will speed up mobile communications and also enable more computing tasks to be carried out at the edge.

For businesses it presents the opportunity for a greater understanding of customer patterns and infrastructure needs. We spoke to Chris Gehlen, CEO and co-founder of SaaS/NaaS cloud platform Neutroon, to learn more.

Continue reading

A CISO's guide: Maximizing your first 30 days

CISO

It can be a challenging proposition to navigate your first 30 days as CISO. You have the responsibility of securing an entire company on your shoulders, and you know that without robust security infrastructure and processes, the organization is exposed to external threats, service restrictions and degradation, and insider risk.

To effectively guide your organization’s security posture, tackle your first 30 days with a strategic mindset and focus on the following three key priorities: taking in information, identifying quick wins, and implementing robust processes.

Continue reading

IBM and SAP team up to offer consumer goods and retail AI solutions

Industry giant IBM is today announcing a collaboration with ERP specialist SAP to develop solutions to help clients in the consumer packaged goods and retail industries enhance their supply chain, finance operations, sales and services using generative AI.

This involves embedding IBM's watsonx enterprise-ready AI and data platform and AI assistants, into SAP solutions to create new generative and traditional AI solutions focused on addressing the complexities of the direct store delivery business process and product portfolio management.

Continue reading

Generative AI use in the workplace leads to added risks

More than 10 percent of enterprise employees access at least one generative AI application every month, compared to just two percent a year ago, but there are security risks as a result.

New research from Netskope shows ChatGPT was the most popular generative AI application in 2023, accounting for seven percent of enterprise usage. The number of cloud apps the enterprise accessed also increased by an average of 19 percent per year, with users jumping from 14 to 20 different apps in just two years.

Continue reading

Who will win the battle of open vs closed AI? [Q&A]

Artificial Intelligence Bias

Closed AI products like Bard and ChatGPT (ironically from OpenAI) have already delivered a practical, powerful chatbot experience and are being employed by many businesses.

Open AI by contrast is still in its early stages and has not seen wide adoption. We spoke to Mike Finley, CTO and co-founder of AnswerRocket, to find out the differences between the two and how they're set to develop.

Continue reading

Enterprises struggling with more vulnerabilities than they can handle

stressed overwork pressure

According to new research 82 percent of companies report an increase in the gap between the number of vulnerabilities/exposures in their environment and their ability to remediate them.

The 2024 State of Security Posture Survey from XM Cyber is based on a survey of 300 CISOs and security decision-makers from large organizations in the US and UK, and shows 62 percent of security and IT teams actively engage in the remediation of exposures or vulnerabilities, handling an average of 12 per week.

Continue reading

Organizations don't know how to address software supply chain security

supply chain

Organizations are struggling to keep up with vulnerabilities amid software supply chain complexity, with more than 40 percent still in reactive mode according to a new report from Slim.AI.

The 2023 Container Report, based on a survey conducted with Enterprise Strategy Group, shows few organizations know exactly how to address security in the upstream dependencies of the applications and the containers they run in production.

Continue reading

© 1998-2025 BetaNews, Inc. All Rights Reserved. Privacy Policy - Cookie Policy.