How the ‘composable enterprise’ can help solve upgrade headaches

There’s a lot to be said for a really snazzy Lego kit. Maybe it’s the Millennium Falcon that your front room is crying out for (complete with hinged smuggling compartments for hiding from the Empire). Or perhaps paying homage to the city of New York with a 1,600-piece Statue of Liberty is just the ticket.

Completing a Lego kit is extremely satisfying. You can take your time, work instruction by instruction and you know what you’re going to get. But once a kit is completed,...

Debunking three sunk cost fallacies in selecting enterprise software

Has your business ever avoided investing in key software systems simply because of perceived high costs? This inaction is an example of a sunk cost fallacy.

Both psychologists and behavioural economists have noted that humans have a stronger natural tendency to avoid losses than to pursue gains. However, a sunk cost needs to be addressed differently than a risk of future loss because the sunk cost has already been paid and should be considered independent of future decisions....

Embracing an agile culture for business growth: A guide to best practice – and what to avoid

Professional services company Accenture found itself in a crisis. The company’s growth stunted. When leadership investigated the reasons why, they came to realise that their promotions and rewards system benefited those employees who were more focused on self-promotion, compared with those whose focus was helping the organisation succeed.

So, company leaders decided to embrace change and use a different, more collaborative, performance conversation rather than continuing with...

Seeking the answers to today’s toughest enterprise endpoint security questions

Enterprises who are increasing the average number of endpoint security agents from 9.8 last year to 10.2 today aren’t achieving the endpoint resilience they need because more software agents create more conflicts, leaving each endpoint exposed to a potential breachOne in three enterprise devices is being used with a non-compliant VPN, further increasing the risk of a breach60% of breaches can be linked to a vulnerability where a patch was available, but not applied. Windows 10 devices in...

AI enterprise apps ‘rapidly evolving’ with CRM and ERM spheres key, says IDC

The role of artificial intelligence (AI) applications in enterprises is 'rapidly evolving' with particular focus on the customer relationship management (CRM) and enterprise resource management (ERM) spheres, according to IDC.

As per the analyst firm's latest Worldwide Semiannual Artificial Intelligence Tracker analysis, IDC found global revenues for the overall AI market, including software, hardware and services, will top $156.5 billion in 2020.Of this, software will comprise...

How to win friends and influence people: Using workplace technology to attract and retain staff

For years we have been promised that the gap between consumer and workplace technology is closing – from the introduction of policies such as bring your own device (BYOD) to some businesses directly consulting employees on which new technologies they’d like to use.

This sounds great in theory, but the reality of workplace technology is much less perfect for many of us. While the technology people use in their home lives seems to continue improving at an exponential rate,...

Move over BYOD: Meet BYOH – ‘bring your own home’

The Covid-19 pandemic has forced companies around the world to do something most of them were not ready to do – ask all their employees to work from home. A recent Gartner survey showed that 74% of chief financial officer respondents stated they planned to transition at least part of their workforces to permanent remote working. Much to their surprise, businesses are finding the transition to home more palatable that expected – in some cases, it has worked so well that measurable...

BlackBerry protects ‘upwards of 96%’ of all cyberthreats, says Frost & Sullivan

A report from Frost & Sullivan has praised BlackBerry's security capabilities, saying the company can protect 'upwards of 96%' of all cyberthreats as well as all IoT endpoints.

The report assessed the cyberthreat landscape more generally and found that comprehensive endpoint-based security can protect up to 97% of attacks. This percentage is likely to increase due to the growing number and importance of IoT devices. Across industry, the next five years are likely to see at...

How to build a business case for endpoint security

Bottom line:  Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach.

Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable with out-of-date security patches, yet integrated into a corporate network to provide access. For these reasons and more, endpoints are now the popular choice for hacking attempts. Ponemon Institute’s...

MobileIron report warns of C-suite risk to mobile security

It is already commonly regarded that humans are the weakest link in the chain when it comes to cybersecurity - but a new MobileIron study has found that the fish rots from the head.

According to the enterprise security provider, based on interviews of 300 enterprise IT decision makers and 50 C-level executives, the C-suite is the most likely group within an organisation to ask for more relaxed mobile security protocols, in spite of being the most likely targets for...