Biggest hindrance to enterprise network visibility is lack of IT staff
Network performance monitoring specialist AppNeta has released its 2019 State of Enterprise IT Report, which finds that as enterprise IT deals with fundamental changes networking infrastructure teams are being stretched to the limit.
The biggest hindrances to network visibility are seen as lack of IT staff (25.6 percent), poor network management tools, (24.8 percent) and lack of visibility into app delivery paths (24.7 percent).
Microsoft and Oracle connect their clouds
Two of the giants of enterprise cloud technology have today announced a cloud interoperability partnership, enabling customers to migrate and run mission-critical enterprise workloads across Microsoft Azure and Oracle Cloud.
Enterprises can now seamlessly connect Azure services, like Analytics and AI, to Oracle Cloud services, like Autonomous Database. By enabling customers to run one part of a workload within Azure and another part of the same workload within the Oracle Cloud, the partnership delivers a highly optimised, best-of-both-clouds experience.
Secure contact center payment solution comes to the cloud
Contact center data security specialist Semafone is making its Cardprotect available as a cloud solution in the US for the first time.
Companies now have the choice of running Cardprotect on premise, as a managed appliance, in a hybrid could or fully cloud solution. The new, cloud version enables a much faster, more scalable, flexible and cost-effective deployment, as there is no need for contact centers to purchase or manage equipment.
64 percent of organizations believe they have suffered a breach due to privileged access
A global survey of over 1,000 IT security decision makers by privileged access management specialist BeyondTrust reveals that 64 percent believe they've had either a direct or indirect breach due to employee access in the last year, and 62 percent believe they've had a breach due to vendor access.
Employee behavior continues to be a challenge for a majority of organizations. Writing down passwords, for example, is cited as a problem by 60 percent of organizations, while colleagues telling each other passwords was also an issue for 58 percent of organizations in 2019.
5 mistakes you might be making with your company's IT infrastructure
Technology has changed the way that companies in most industries do business. From internal communications to external marketing and PR, market research to customer engagement, and decision-making through to execution, virtually every facet of modern business leans on technology or data in a significant way. Because of this reality, the average company’s IT infrastructure is the beating heart of the organization. Without workable IT, the average business won’t just be slowed down; it will be unable to function.
Most businesses have workable IT. However, many companies could be doing more with technology if they learned how to avoid these five common pitfalls of IT infrastructure design, operation, and maintenance.
How to measure your company's digital adoption trajectory
We live in a digital era, where digital adoption is critical for every business. It doesn’t matter what industry you’re in, your customers expect to be able to do everything online, and preferably from their phones. Digital adoption cuts right across the B2B and B2C divide.
It’s not just your customers, either; your employees demand it too. Your employees are increasingly born in the digital age. They look for smooth, smart, intuitive digital tools to assist and support them in every corner of their working life. Despite the importance of digital adoption, not every enterprise succeeds in introducing it. There are a number of obstacles to successful digital adoption, including employees and users who are resistant to change, interfaces that are complex to master, and a sense of overwhelm at the number of digital tools before us.
5 reasons your organization needs to adopt a zero trust security architecture
Traditionally, network architectures were designed and secured according to the "castle-and-moat" model. Like a medieval fortress, an enterprise data center was imagined to have impregnable and unbreachable walls. All traffic entering or exiting would pass through a single access point, where a security gateway appliance would sit, like a knight in shining armor. This device would police the network traffic on a packet-by-packet basis, allowing traffic it deemed ‘safe’ unrestricted access to the network’s trusted interior.
Although this model is as outdated as chain mail is for 21st-century military combat, its legacy endures in assumptions and presuppositions that can prevent business decision makers from choosing the most effective cybersecurity tools and solutions for today’s complex threat landscape.
Staff break IT rules in order to do their jobs with management the worst offenders
A new survey of more than 3,000 people around the world finds 46 percent of employees access personal documents on their work device without the IT department's permission.
The study from Snow Software also shows 41 percent of global employees are going behind IT's back to get professional software and applications.
Why digital transformation must be optimized for speed and success [Q&A]
Companies worldwide across all industries are enacting digital transformation (DX) initiatives -- and for good reason. If completed successfully, modern technology implementation drives competitive advantage and makes business operations much more real-time.
However, the journey to the DX finish line is unfortunately sometimes much more of sprint than a marathon, as speed is the currency for organizations to complete the process.
Identity and access management proving too difficult for many businesses
According to a new study, businesses find identity and access management (IAM) and privileged access management (PAM) among their most difficult operational tasks.
The survey, by access management firm One Identity, of 200 attendees to the 2019 RSA Conference, finds that while a third of respondents say PAM is the most difficult operational task, only 16 percent of respondents cite implementing adequate IAM practices as a top-three concern when it comes to securing the cloud.
61 percent of organizations are worried about email-borne threats
Email is still the main vehicle for cybercriminals to deliver threats according to a new report, and 61 percent of IT decision makers think their organization will suffer a negative impact from an email-borne attack this year.
The study from email and data security company Mimecast shows that impersonation attacks have increased 67 percent in comparison to the results in last year's report.
How microsegmentation can deliver zero trust security [Q&A]
With a never-ending supply of new security threats presenting themselves every day, it can be tough for IT departments to keep up.
While perimeter security continues to be important, the sheer volume of novel attacks means that, eventually, an attack will bypass defenses and gain a foothold in the interior. To harden the network interior, best practice now calls for microsegmentation to achieve a zero trust environment, but that’s not easy to do.
Quality issues with training data are holding back AI projects
For many organizations, AI and machine learning are seen as a route to greater efficiency and competitive advantage.
But according to a new study conducted by Dimensional Research for Alegion almost eight out of 10 enterprise organizations currently engaged in AI and ML report that projects have stalled, and 96 percent of these companies have run into problems with data quality, data labeling required to train AI, and building model confidence.
Why change management is essential to digital transformation projects [Q&A]
Digital transformation is currently an attractive option for many businesses. But to make it work it needs to be effectively managed.
We spoke to Nital Hooper, senior manager consulting at consultancy company Servita to find out about the importance of change management to successful digital transformation.
72 percent of cyber security professionals have considered quitting over lack of resources
A new study from Censornet into the challenges facing cyber security professionals shows that 79 percent think their companies are suffering from a lack of resources, both in terms of people and technology, and 72 percent have considered leaving their jobs for this reason.
The survey also finds that security professionals are not being helped by their security solutions. 65 percent want more technology but the average number of security products used is already 33 and 57 percent report they are suffering from alert overload.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.