Articles about Enterprise

How to move beyond the burden of legacy systems [Q&A]

legacy system

These days, companies are seeking to stay competitive and current by pursuing and succeeding at end-to-end digital transformation.

Successful digital transformation brings a myriad of benefits to organizations of all types, including operational efficiencies, improved customer engagement and digitally-enabled sales and service. However, organizations can't fully embrace and reap the benefits of digital transformation if they're still relying on their old legacy environment.

Continue reading

More than 88 percent of organizations now use the cloud

cloud button

A new report finds that more than 88 percent of organizations use cloud infrastructure in one form or another, and 45 percent expect to move three quarters or more of their applications to the cloud over the next twelve months.

The study from O'Reilly surveyed 1,283 software engineers, technical leads, and decision-makers from around the globe and finds that 21 percent of organizations are hosting all their applications in a cloud context.

Continue reading

Remote working doesn't help productivity

Lazy home worker

Although home workers have spent more hours in front of their computers than before the pandemic, the extra hours haven't translated into increased productivity according to a new study.

The report from digital experience management company Aternity looks at the extent to which remote employee productivity is affected by application performance. It also examines which applications work better in the home compared to the office.

Continue reading

Majority of CEOs lose sleep over cybersecurity worries

Businessman insomnia

Over 76 percent of CEOs are consistently losing sleep over the fear of becoming the next headline-grabbing security breach, yet less than half of them have a firm cybersecurity strategy in place.

A new study from cybersecurity company Forcepoint in partnership with WSJ Intelligence surveyed 200 senior executives from a range of industries to find the major cybersecurity stresses and areas of disconnect for business and security leaders.

Continue reading

GlobalSign reveals new platform to ease PKI management

Crystal ball with key

Public Key Infrastructure (PKI) is essential to handling the issuing of digital certificates and managing public-key encryption, but it can prove a burden for businesses.

To make the process easier, certificate authority GlobalSign is launching a new automated PKI platform called Atlas.

Continue reading

The hidden cost of GDPR data access requests

requests folder

UK businesses are spending £1.59 million and 24 person-years annually on processing data subject access requests in compliance with Article 15 of GDPR, according to a new study commissioned by privacy specialist Guardum.

Data Subject Access Requests (DSARs) require data controllers to provide data subjects with a copy of their personal data within 30 days, or risk a fine of €20 million or four percent of turnover.

Continue reading

Compliance requirements threaten to become a major burden for business

Worry

More than half of companies questioned in a new survey are spending 40 percent or more of their IT security budgets on compliance.

The research from Coalfire, a provider of cybersecurity advisory and assessment services, in conjunction with consulting firm Omida, also reveals that nearly 60 percent of companies view compliance as a barrier to enter new markets and prepare news services to meet compliance requirements.

Continue reading

New access suite helps companies integrate their security

Access management

It's not uncommon for enterprises to use a number of different analytics and operations tools as part of their security posture.

Managing these different tools as part of an overall policy, though, can be difficult. Pulse Secure is launching a new suite of secure access solutions for hybrid IT that provides organizations with a simplified, modular and integrated approach to modernize their access productivity, management and control.

Continue reading

Zero trust adoption grows as businesses look for end-to-end security

Broken trust

The idea that organizations should have a trusted internal network and an untrusted external one is rapidly giving way to a posture of zero trust across the board.

A new survey of 500 IT security leaders by identity specialist Okta finds a massive 275 percent year-on-year growth in the number of North American organizations that have or plan to have a defined zero trust initiative on the books in the next 12-18 months.

Continue reading

Home working leads to 42 percent increase in devices on corporate networks

Network security

New research released today from Sepio Systems, a rogue device mitigation firm, reveals a 42 percent jump in the number of devices connected to corporate networks, compared with the pre-COVID-19 period.

Not only has the number of connected devices increased, there are also almost three times the number of different device vendors. This means many unbranded or budget makes of equipment being used that are not commonly found in the enterprise environment.

Continue reading

5 phishing attack methods every business should know in 2020

Phishing

There was a time when the main tech-based worry for any business were viruses. Large companies spent thousands of dollars on antivirus software, while those that didn’t paid the price when one of their client machines became infected, crippling their infrastructure and effectively grinding the whole operation to a screeching halt. In the modern era, pretty much every computer terminal you can buy comes with some sort of virus protection, which tends to do a pretty decent job so long as the security patches are installed promptly on all machines across the business.

In addition, companies are also taking advantage of the internet. Many now have various components of their infrastructure such as workstations, servers, and web applications that are connected online. Hackers try to breach company networks by exploiting these components. Fortunately, their attempts are now easily thwarted by the use of web application firewalls (WAF) which can block malicious traffic and unauthorized requests sent to these devices.

Continue reading

IBM and Red Hat launch edge computing solutions for the 5G era

Edge computing

The rollout of the 5G network, bringing greater speed and lower latency to mobile data, is going to provide a boost to the utility of edge computing.

The second announcement to come from IBM's virtual Think conference today is a set of new offerings built on Red Hat OpenShift, allowing enterprises to autonomously manage workloads across a massive volume of edge devices.

Continue reading

IBM uses the power of Watson to automate IT operations

Automation

Normally at this time of year IBM's annual Think conference would be getting underway. This year's event is, of course, being held digitally and has kicked off with some new announcements.

The first is the unveiling of IBM Watson AIOps, a new offering that uses AI to automate how enterprises self-detect, diagnose and respond to IT anomalies in real time.

Continue reading

How businesses can benefit from process automation [Q&A]

Automation

As the robotic process automation (RPA) market heats up, more businesses are looking to bring RPA into their business processes, but where do they start?

Enterprises are in the dark about how to integrate bots into their existing processes, and those that go into the buying process without a clear vision will meet roadblocks.

Continue reading

Why payroll security is even more essential now remote work is the norm

payroll

The COVID-19 pandemic is changing the way people work and do business. As governments worldwide impose compulsory community quarantines and lockdowns, many are turning to the internet to continue operating their businesses or doing their jobs. Teleworking is becoming the new normal with everyone expected to observe physical distancing to avoid the pandemic spreading.

Among other systems, payroll is one of the workflows worth examining amidst the changes brought about by the pandemic. As companies adopt remote work arrangements to avoid complete operational shutdown, those that have been manually processing their payroll need to find ways to adjust to the new situation.

Continue reading

BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.

© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.