About 14 results
-
The mid-market conundrum: How do smaller companies get their tech supplier to care?
Outsourcing is easy for giant businesses, but it's much harder to get right if you are a smaller company.
-
BYO security: Three ways to tighten iPad and smartphone access without choking innovation
It's hard to stop staff using their own iPhones and tablets, so make the most of it...
-
User experience monitoring: How the right tools can boost productivity
Uncovering what's making users unhappy with apps...
-
Time to tighten up on sysadmins? Ten tips for safer IT management
Systems administrators are human and make mistakes...
-
What the next evolution of enterprise IT means for your job
Businesses use of technology is changing and that has a knock on effect on career prospects for IT workers.
-
Identity, access management and the rise of bring your own identity
Companies now have more external users than internal ones: how do we manage digital identities without creating huge complexity?
-
Hacker or user? How to tell friend from foe
With so many staff and customers operating outside the conventional firewall, firms are rethinking their controls and security - which is where the identity perimeter comes in.
-
How good's your network? Neglect could bite you on the bottom line
Most businesses might well be surprised at how poorly their network is serving them...
-
Security strategy: Staff smartphones ring the changes
Employees' own devices at work must cause a security rethink...
-
Software security: Are firms right to outsource scanning for flaws?
More end-user organisations and software vendors are using outsourced services to check app for vulnerabilities, so it's important to understand the processes involved.