What businesses need to know about a mobile strategy

Business mobile devices

Mobile was once the concern of IT managers. But now that the responsibility for business mobility has spread to every part of the enterprise, with a mobile first strategy becoming increasingly prevalent, it’s essential that the CEO sits up and pays attention.

Mobile is now an intrinsic part of everyday life and has spilled into the workplace via Bring Your Own Device (BYOD) and Chose Your Own Device (CYOD). As a consequence the CEO needs to have mobile as a key consideration, because as the old adage goes "not having a plan is planning to fail".

Continue reading

How much does it cost to start a business in UK?

Confused woman

How much money do you think it needs to kickstart a business in UK? A couple of thousands? Maybe go straight into five figures? Wrong. According to a new report by cloud accounting software provider FreeAgent, you probably don't need any money.

The company surveyed micro-business owners and freelancers in the UK, and according to the results 44 percent of business starters required no funds at all. Almost the exact same percentage (43 percent) used their personal savings, and that was enough. Four percent borrowed money from friends or family, two percent used either credit card or bank loan, while just one percent used government assistance.

Continue reading

Forty percent of enterprise networks show evidence of DNS tunneling

DNS

DNS tunneling is a significant security threat that can enable cybercriminals to insert malware or pass stolen information into DNS queries, creating a covert communication channel that bypasses most firewalls.

A new report released by network control company Infoblox reveals that 40 percent of the enterprise files it tested in the second quarter of this year show evidence of DNS tunneling.

Continue reading

Software-defined networking is here, whether enterprises are ready or not

Network

Software-defined networking will enable today’s explosive data growth to continue by making telecoms more agile and scalable.

Network traffic is growing at an astonishing rate. We attribute this to video conferencing, dynamic cloud workloads and unified communications. Data traffic on the AT&T wireless network grew more than 150,000 percent between 2007 and 2015. This is only the beginning, though. New technology will continue to push bandwidth demand even higher in the future. This includes the Internet of Things, 4K video, virtual reality and augmented reality.

Continue reading

The digitization of manufacturing

Connections lines digital

When I was younger, I used to think of the classical manufacturing companies as dinosaurs, part of the old economy. For me, they were large and slow lumbering beasts, many of them soon to be extinct, and rendered obsolete by emerging high-tech companies like Nokia, Intel, Microsoft. I was not alone in this feeling.

Manufacturing companies built cars, compressors, drilling equipment and all sorts of other products that I rarely encountered in daily life. In my mind, I contrasted these traditional manufacturers with the new economy in which I was working. High-tech and software was cool, innovative and forward looking. Manufacturing was boring, dirty and obsolete.

Continue reading

How HP has changed after the split [Q&A]

Question

We recently sat down with George Brasher, the managing director for UK and Ireland at HP, to discuss his approach to business and how the company has changed since the split from HP Enterprise.

You can read the Q&A below.

Continue reading

New service allows secure connection to APIs

Intelligent APIs

The rate of change required for business software has increased dramatically in recent years. In order to keep up many firms rely on APIs but these introduce their own problems, especially in regard to security.

Identity and device management company Okta is launching a new service that secures the connections between applications, services and APIs.

Continue reading

Application-defined WAN improves remote cloud working

network

Moving applications to the cloud and distributing work to remote offices places new strains on networks. According to Microsoft's guidelines for Office 365 adoption, enterprises should plan for up to four times increase in WAN bandwidth, and enable direct-to-cloud access from the remote office to avoid sub-optimal performance.

Software-defined WAN pioneer CloudGenix is addressing this problem with the launch of its Instant On (ION) 3000v application-defined fabric, an SD-WAN platform for virtualizing remote offices.

Continue reading

New platform seeks to automate risk management

Risk dial

Identifying and prioritizing cyber threats is a problem for large organizations and it's easy to become overwhelmed with information. This is why, increasingly, they're turning to solutions to automate the process.

Risk analysis specialist Bay Dynamics is launching a new version of its analytics platform, Risk Fabric, that helps companies measure, communicate and reduce cyber risk. It automatically delivers prioritized threat and vulnerability information, based on the value of assets at risk, to the business leaders who are responsible for those assets.

Continue reading

Responding to the changing threat landscape facing enterprises [Q&A]

Tightrope sharks threat

Not so many years ago corporate IT security involved installing a firewall and antivirus solution. But the threat landscape has now become much more complicated and is changing faster than ever.

Companies need to be aware of these changes and make sure their security arrangements can keep up. We spoke to Shai Gabay, the chief innovation officer of security operations and advanced threat detection specialist CYBERBIT, to find out more about the risks and solutions.

Continue reading

One in four breaches in the financial sector are from lost or stolen devices

computer theft

New research from data protection company Bitglass into breaches in the financial services industry reveals that leaks nearly doubled between 2014 and 2015, and that lost and stolen devices are the most common cause.

While hacking remains a major fear, only one in five leaks were caused by it. Other breaches were the result of unintended disclosures (14 percent), malicious insiders (13 percent), and lost paper records (8.1 percent).

Continue reading

Cloud platform lets marketers deliver personalized Google Ads

Personalized mail

Google Ads has proved itself an effective tool for gaining new business, but it's a rather less useful way of targeting existing customers.

Now though, marketing cloud specialist Optimove is launching a new integration with Google Ads. This allows businesses to target existing customers with personalized ads on google.com and across the Google Display Network, based on recent and predicted behavior patterns.

Continue reading

Hate the software you have to use at work? You are not alone

Tired, Exasperated, Frustrated man at mac

Are you frustrated with clunky workplace systems? Do you wish that you could work with a more modern streamlined solution?

You're in good company, a new study by app platform specialist Sapho in conjunction with research firm Forrester reveals that 91 percent of employees agree simplified enterprise apps would increase their efficiency and productivity. In addition 75 percent of employees say they have a hard time accessing information in their enterprise systems and applications.

Continue reading

Most US IT practitioners earn $100k annual salaries

Executive spend

Automated software delivery specialist Puppet has released the result of its latest DevOps Salary Report which shows that most IT practitioners in the US earn a $100,000 annual salary.

It also finds that 43 percent of IT managers earn $150,000 or more, up from 26 percent last year. The report is based on data gathered from more than 4,600 respondents to the survey.

Continue reading

Cloud-based identity service streamlines SaaS adoption

cloud lock

SaaS application adoption is growing fast and with it comes increasing expectations to be able to access any application from anywhere on any device.

Consequently organizations want login solutions that can help them reduce risks in their environment, deliver a better experience for their end-users, and adapt to the complexities of existing infrastructure and new applications.

Continue reading

Load More Articles