A guide to Mac device management: Enrolment, rollout and support

If your Windows-based company is about to introduce Apple devices management for the first time, you and your IT team may feel uneasy about getting up to speed with this new operating system (OS).

The good news is that Apple devices were designed for secure, remote management, and their administrative tools are as beautiful and intuitive as their hardware design.

To help you break into this new space, here’s a brief guide to help you better understand how Mac computers...

How the ‘composable enterprise’ can help solve upgrade headaches

There’s a lot to be said for a really snazzy Lego kit. Maybe it’s the Millennium Falcon that your front room is crying out for (complete with hinged smuggling compartments for hiding from the Empire). Or perhaps paying homage to the city of New York with a 1,600-piece Statue of Liberty is just the ticket.

Completing a Lego kit is extremely satisfying. You can take your time, work instruction by instruction and you know what you’re going to get. But once a kit is completed,...

How to build a business case for endpoint security

Bottom line:  Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach.

Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable with out-of-date security patches, yet integrated into a corporate network to provide access. For these reasons and more, endpoints are now the popular choice for hacking attempts. Ponemon Institute’s...

Six key areas where AI is improving customer experiences

Bottom Line: This year’s hard reset is amplifying how vital customer relationships are and how much potential AI has to find new ways to improve them.

30% of customers will leave a brand and never come back because of a bad experience.27% of companies say improving their customer intelligence and data efforts are their highest priority when it comes to customer experience (CX).By 2023, 30% of customer service organizations will deliver proactive customer services by using...

Apple subsidiary Claris launches low-code automation platform

Claris International, a subsidiary of Apple, has announced the launch of its ‘Claris Connect’ workflow automation platform.

According to the company, the platform is designed for the real-world challenges of small and medium businesses. After several months of testing and growth of its library of connectors, the company is now finally all set to drive digital transformation for any...

Scope AR acquires studio WakingApp as enterprise augmented reality ramps up

Scope AR, a San Francisco-based provider of enterprise-focused augmented reality (AR) software, has announced it is to acquire AR studio WakingApp.

WakingApp offers a proprietary AR platform which focuses on being of use to enterprises across industries. The company said it was ‘thrilled’ to join Scope AR and ‘become an integral part in the delivery of first-class AR solutions to...

Are we doing enough to secure our digital business? Why automation is the answer

To nobody’s shock, security shortcomings exist everywhere. Take senior IT leaders and the customers they serve. These customers believe IT leaders have taken every security precaution possible, yet any knowledgeable IT professional can look at their setup and see gaps. Unfortunately, the disparity between perceived protection and actual exposure also exists at the enterprise level.

Most...

There’s always one rotten app in the bunch: Google launches App Defense Alliance

Google has announced the founding of the App Defense Alliance to help defend the company’s app store from bad actors – with security partners ESET, Lookout and Zimperium all on board.

The move will see the Google Play Protect detection systems for malicious apps integrated with the scanning engines of each partner. The partnering companies were chosen specifically for their specialisms in...

Using AI to secure the modern world – where enterprises are particularly vulnerable

The types of threats that are targeting enterprises are evolving and completely different to what they were a decade ago. Enterprise attacks are no longer executed by “lone wolf” hackers, but instead come from highly sophisticated and professional cybercriminal networks. Artificial Intelligence (AI) and machine learning (ML) can be harnessed by hackers to automatically seek out weaknesses in organisations’ ecosystems. 

Getting IT automation projects right the first time: A guide

As the speed of digital business continues to accelerate, organisations are turning to automation to remain successful. Based on the findings of its third annual Robotic Process Automation (RPA) survey, Deloitte believes RPA will achieve “near universal adoption” in the next five years. Yet adoption doesn’t always equal value. Some early adopters have gained substantial value, but others have struggled to successfully implement automation or scale it to meet their...