Maintaining a robust, secure and compliant environment

The modern business depends on its IT systems running 24×7 and being available to users wherever they are, whatever device they use. Electronic data has also become critical, and the need to secure, protect and govern it grows continuously as external threats become more ubiquitous and as regulatory demands ramp up. The availability and security of IT systems and data is now a board room concern.

Our Content:

The politics and practicalities of sustainable IT

A senior leadership perspective

View More
Tape is back on the main menu

The news that another of the big players in global file systems, Hammerspace, has integrated[...]

View More
Can steel fences halt the march of cyber?

Cyber: for some, it’s a prefix that conjures up images of Dr Who’s silvery cyborg[...]

View More
It’s time to look again at IT and Software Asset Management

In the realm of IT administration, it’s all too easy to get stuck in familiar[...]

View More
Standardized solution implementation services

Shorten time-to-value, reduce costs and risks, and future-proof your investment

View More
Digital identity: the many images of you

More and more of the topics we deal with at Freeform Dynamics now also relate[...]

View More
Trust: easy to lose, hard to recover

Here are just a few of the topics that my fellow Freeformers and I have[...]

View More
Getting real about IT sustainability

From good intentions to tangible results through smart systems selection

View More
Have you made the right platform choices to minimise risk?

Critical systems have to run and run…

View More
S/4HANA without compromise

A modern ERP architecture needs a powerful and future-proof platform

View More
Digital identity and opening up the smartwallet

When an 80 year-old relative asks you how she can use her phone to both[...]

View More
Linux and sustainability

The emerging role of modern, high-scale consolidation platforms

View More
Singing the key management blues

We need cryptographic keys, but who is going to manage them?

View More
Why does ransomware still work?

As someone who first encountered ransomware during the last millennium

View More
Ransomware teaches the importance of data protection

Several years ago, around the time that ransomware attacks started making the front pages

View More
Forget the ‘free’ software, the real value of open-source is the collaboration

Analyst Opinion: It’s a cliché, but why are we still reinventing wheels?

View More
Which is worse: noise, or the sound of silence?

Analyst Opinion: If you’re one of the many people who find offices too noisy

View More
Achieving success with your S/4HANA proof of concept (POC)

What to consider when selecting platforms, tools and services

View More
The business need for simpler storage

What to consider when planning for modern IT in the hybrid cloud era

View More
How to boost supplier commitment without spending more money

Time to tune into those non-revenue goals

View More
Data governance in software testing

Throwback Thursday: this week we're going back to 2008

View More
The importance of modern data archiving

In today’s business world, the value of archiving is greater than ever

View More
Covid quick fix payback time

How long will people put up with the emergency fixes?

View More
Dispelling the myth of the industry-standard server

What you thought you knew has changed

View More
Identity and access management revisited

A changing world demands simplification and an urgent focus on security

View More
Zero Trust: securing the endpoint

How continuous authentication could help secure the work-anywhere world

View More
A new perspective on the modern workplace

Forward-looking lessons from real-life pandemic experiences

View More
Safe and Effective Remote Working

Addressing immediate pandemic-related needs while laying foundations for the future

View More
Network security in the spotlight

Understanding why it can go wrong is key to making the right investment decisions

View More
Lifecycle Management of HCI Systems

Every element of the solution needs attention

View More
Why backup to flash

Analyst Blog: There are some things that simply have to happen, no matter how modern[...]

View More
Digital workspace disasters and how to beat them

New roles for user management and app deployment in the digital workspace

View More
Managing Software Exposure

Time to fully embed security into your application lifecycle

View More
Dealing with the GDPR Challenge Infographic

The catalyst for a move to modern data protection

View More
Data Protection Revisited – Business

A risk review and investment guide for business executives

View More
Data Protection Revisited – IT

A risk review and investment guide for IT professionals

View More
All-in-one Data Protection

Taking the pain out of information management

View More
GDPR: the Security Dimension

Information security, governance and regulation in harmony

View More
Data Management for a Digital World

Turn GDPR compliance and ransomware defence to your advantage

View More
Causes of software development woes

Respondents point the finger at ambiguous requirements

View More
Integrating Security Into the DNA of Your Software Lifecycle

“Masters” move beyond pure risk management to focus on business growth

View More
Requirements-driven software development and quality management

Removing the ambiguity from your delivery pipeline

View More
Information management is going mainstream – at last!

Analyst opinion Some assumptions have been held by IT pros for so long that they[...]

View More
GDPR’s latest gift? Class action privacy cases

Analyst opinion Europeans will in future be able to bring US-style class actions for (alleged)[...]

View More
Getting a grip on the GDPR

Here's our tips on how to plan rather than panic

View More
So long, and thanks for all the phish

How to avoid that hook at the end of a fraudster’s line

View More
Don’t Let an Outdated Software Strategy Hold You Back

Yesterdays software delivery processes are not up to dealing with today’s demands, but modernising you[...]

View More
Enterprise file sync and share comes of age

The enterprise file sync and share market has truly come of age, with products and[...]

View More
Managing Web and Mobile Security Risk

Securing the applications and services that underpin your online and mobile presence is one thing,[...]

View More
Rethinking long term data management

The emerging role of active archiving

View More
Managing Cloud Complexity

The emerging role of converged services

View More
IT Decision-Making in the Digital Age

Making the right technology investments in today’s fast moving digital age can mean the difference[...]

View More
Protecting data in your hyper-converged environment

In a nutshell Hyper-converged infrastructure (HCI) has been gaining popularity as a way of simplifying[...]

View More
A peek behind the AI bandwagon

When an important topic or trend gives rise to a marketing and media bandwagon, any[...]

View More
Data encryption must be a priority for the digital business

Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise[...]

View More
Intelligent Systems in Action

As technology becomes smarter, more opportunities arise to exploit AI, machine learning and other forms[...]

View More