Maintaining a robust, secure and compliant environment
The modern business depends on its IT systems running 24×7 and being available to users wherever they are, whatever device they use. Electronic data has also become critical, and the need to secure, protect and govern it grows continuously as external threats become more ubiquitous and as regulatory demands ramp up. The availability and security of IT systems and data is now a board room concern.
Our Content:
It’s time to look again at IT and Software Asset Management
In the realm of IT administration, it’s all too easy to get stuck in familiar[...]
View MoreStandardized solution implementation services
Shorten time-to-value, reduce costs and risks, and future-proof your investment[...]
View MoreDigital identity: the many images of you
More and more of the topics we deal with at Freeform Dynamics now also relate[...]
View MoreTrust: easy to lose, hard to recover
Here are just a few of the topics that my fellow Freeformers and I have[...]
View MoreGetting real about IT sustainability
From good intentions to tangible results through smart systems selection[...]
View MoreHave you made the right platform choices to minimise risk?
Critical systems have to run and run…[...]
View MoreS/4HANA without compromise
A modern ERP architecture needs a powerful and future-proof platform[...]
View MoreDigital identity and opening up the smartwallet
When an 80 year-old relative asks you how she can use her phone to both[...]
View MoreLinux and sustainability
The emerging role of modern, high-scale consolidation platforms[...]
View MoreSinging the key management blues
We need cryptographic keys, but who is going to manage them?[...]
View MoreWhy does ransomware still work?
As someone who first encountered ransomware during the last millennium[...]
View MoreRansomware teaches the importance of data protection
Several years ago, around the time that ransomware attacks started making the front pages[...]
View MoreForget the ‘free’ software, the real value of open-source is the collaboration
Analyst Opinion: It’s a cliché, but why are we still reinventing wheels?[...]
View MoreWhich is worse: noise, or the sound of silence?
Analyst Opinion: If you’re one of the many people who find offices too noisy[...]
View MoreAchieving success with your S/4HANA proof of concept (POC)
What to consider when selecting platforms, tools and services[...]
View MoreThe business need for simpler storage
What to consider when planning for modern IT in the hybrid cloud era[...]
View MoreHow to boost supplier commitment without spending more money
Time to tune into those non-revenue goals[...]
View MoreData governance in software testing
Throwback Thursday: this week we're going back to 2008[...]
View MoreThe importance of modern data archiving
In today’s business world, the value of archiving is greater than ever[...]
View MoreDispelling the myth of the industry-standard server
What you thought you knew has changed[...]
View MoreIdentity and access management revisited
A changing world demands simplification and an urgent focus on security[...]
View MoreZero Trust: securing the endpoint
How continuous authentication could help secure the work-anywhere world[...]
View MoreA new perspective on the modern workplace
Forward-looking lessons from real-life pandemic experiences[...]
View MoreSafe and Effective Remote Working
Addressing immediate pandemic-related needs while laying foundations for the future[...]
View MoreNetwork security in the spotlight
Understanding why it can go wrong is key to making the right investment decisions[...]
View MoreWhy backup to flash
Analyst Blog: There are some things that simply have to happen, no matter how modern[...]
View MoreDigital workspace disasters and how to beat them
New roles for user management and app deployment in the digital workspace[...]
View MoreManaging Software Exposure
Time to fully embed security into your application lifecycle[...]
View MoreDealing with the GDPR Challenge Infographic
The catalyst for a move to modern data protection[...]
View MoreData Protection Revisited – Business
A risk review and investment guide for business executives[...]
View MoreData Protection Revisited – IT
A risk review and investment guide for IT professionals[...]
View MoreGDPR: the Security Dimension
Information security, governance and regulation in harmony[...]
View MoreData Management for a Digital World
Turn GDPR compliance and ransomware defence to your advantage[...]
View MoreCauses of software development woes
Respondents point the finger at ambiguous requirements[...]
View MoreIntegrating Security Into the DNA of Your Software Lifecycle
“Masters” move beyond pure risk management to focus on business growth[...]
View MoreRequirements-driven software development and quality management
Removing the ambiguity from your delivery pipeline[...]
View MoreInformation management is going mainstream – at last!
Analyst opinion Some assumptions have been held by IT pros for so long that they[...]
View MoreGDPR’s latest gift? Class action privacy cases
Analyst opinion Europeans will in future be able to bring US-style class actions for (alleged)[...]
View MoreSo long, and thanks for all the phish
How to avoid that hook at the end of a fraudster’s line[...]
View MoreDon’t Let an Outdated Software Strategy Hold You Back
Yesterdays software delivery processes are not up to dealing with today’s demands, but modernising you[...]
View MoreEnterprise file sync and share comes of age
The enterprise file sync and share market has truly come of age, with products and[...]
View MoreManaging Web and Mobile Security Risk
Securing the applications and services that underpin your online and mobile presence is one thing,[...]
View MoreIT Decision-Making in the Digital Age
Making the right technology investments in today’s fast moving digital age can mean the difference[...]
View MoreProtecting data in your hyper-converged environment
In a nutshell Hyper-converged infrastructure (HCI) has been gaining popularity as a way of simplifying[...]
View MoreA peek behind the AI bandwagon
When an important topic or trend gives rise to a marketing and media bandwagon, any[...]
View MoreData encryption must be a priority for the digital business
Organizations large and small are investing in digital transformation programs, cloud migration projects, and enterprise[...]
View MoreIntelligent Systems in Action
As technology becomes smarter, more opportunities arise to exploit AI, machine learning and other forms[...]
View MoreCyber Security Ownership and Responsibility
It’s easy to be caught out by a cyber attack or internal mistake that leads[...]
View MoreAPIs and the Digital Enterprise
Application programming interfaces (APIs) have been around for decades. In the early days of IT[...]
View MoreBuilding a Curated Digital Hub
In a nutshell In today’s online business environment, with data spread broadly and widely, making[...]
View More