Category Archives: IT Security, Risk & ESG

What should CIOs be demanding of Storage Vendors?

In most organisations the acquisition of storage and its associated management tools was, until recently,[...]

Personal Use of a Windows Tablet in Business – It’s ready for operational use

There is no doubt that “Tablet” devices and “Slates” are attracting a lot of attention[...]

Agility without anxiety

Dale Vile met up with Perforce’s Mark Warren to discuss how to do agile development[...]

The Rise of User Centric IT – Is the consumerisation of IT a benefit to anyone?

There is a long history of end users wanting, or ‘needing’, to have ‘different’ tools[...]

Balancing storage efficiency and data security

We know from our many studies that most IT organisations are stretched operationally while having[...]

Siloed approach to IT security increases business risk

It is said that the technology at the heart of IT changes at a bewildering[...]

Playing the SLA long game

By Dale Vile When IT is your day job it’s easy to lose sight of[...]

Private Cloud Forecast – Sunny or Stormy times ahead for CIOs?

Businesses are still operating under enormous economic pressure and, as would be expected, this continues[...]

Analyst Headlines: Securing the Data Center

Andrew Buss share’s his views on the significance of a simplified Data Center architecture. This[...]

Behind the Headlines: Securing the Data Center

Andrew Buss share’s his views on the significance of a simplified Data Center architecture. This[...]

Analyst Headlines: Securing the Access

Andrew Buss discusses the impact of the mega trends such as the Consumerization of IT[...]

Behind the Headlines: Securing the Access

Andrew Buss discusses the impact of the mega trends such as the Consumerization of IT[...]

Analyst Headlines: Securing the Wide Area

Andrew Buss discusses how security needs to become embedded and automated within the network and[...]

Behind the Headlines: Securing the Wide Area

Andrew Buss discusses how security needs to become embedded and automated within the network and[...]

BPM from back office to front office and beyond

Are you tough enough to take on BPM and win? Someone has to. It has[...]

Energy Aware Planning and Decision Making

Energy availability and management is increasingly becoming an important agenda item for IT leaders, but[...]

Seven enablers of effective disaster recovery for SMEs

By Tony Lock In a nutshell: Recent research carried out by Freeform Dynamics identified seven[...]

Key points to highlight when selling storage

Organisations of all shapes and sizes are struggling to deal with the rapid growth of[...]

Fast Forward to Big Data

Does ’cloud’ have a roll in providing customers with access to new data sources to[...]

The great DR divide

Business continuity solutions only for large organisations? IT vendors and consulting firms who sell disaster[...]

User Virtualization – Moving beyond device-centric computing

When business IT was young and channel partners had plenty of hardware margins to play[...]

Winners and losers in the information race

The mainstream media generally portrays the financial services industry as being in a total mess,[...]

The secrets of effective disaster recovery

There’s no magic bullet, but there’s a formula Many IT and business executives groan when[...]

Closing the SMB security gap

It’s got the point where the majority of small and medium businesses (SMBs) take the[...]