How to keep software licence management under control: Microsoft, Oracle, SAP, and more

It is hard to run and set up IT systems without solutions from large players. Their offerings are now industry standards and make financial sense, with system compatibility and employee skills the main reasons for their success. While there are many advantages for using solutions from Microsoft, IBM and the like, they come with many strings attached. Hundreds of pages of clauses and terms make their licences hard to manage. Most notably in large organisations, managing licenses requires...

Why cybersecurity remains a key problem across the business

Bottom line: Absolute’s 2020 Endpoint Resilience Report illustrates why the purpose of any cybersecurity program needs to be attaining a balance between protecting an organisation and the need to keep the business running, starting with secured endpoints. Enterprises who have taken a blank cheque approach in the past to spending on cybersecurity are facing the stark reality that all that spending may have made them more vulnerable to attacks. While cybersecurity spending grew at a Compound...

Why securing endpoints is the future of cybersecurity

86% of all breaches are financially motivated, where threat actors are after company financial data, intellectual property, health records, and customer identities that can be sold fast on the Dark Web.70% of breaches are perpetrated by external actors, making endpoint security a high priority in any cybersecurity strategy. 55% of breaches originate from organized crime groups.Attacks on Web apps accessed from endpoints were part of 43% of breaches, more than double the results from last...

BlackBerry protects ‘upwards of 96%’ of all cyberthreats, says Frost & Sullivan

A report from Frost & Sullivan has praised BlackBerry's security capabilities, saying the company can protect 'upwards of 96%' of all cyberthreats as well as all IoT endpoints.

The report assessed the cyberthreat landscape more generally and found that comprehensive endpoint-based security can protect up to 97% of attacks. This percentage is likely to increase due to the growing number and importance of IoT devices. Across industry, the next five years are likely to see at...

Why automation is changing data science for everyone

A key goal of visual analytics and data science is to identify actionable insights that impact business processes – to grow revenue, improve productivity or mitigate risk. Automated AI, or specifically automated machine learning for data science, can help with this goal. AutoML can dramatically increase the productivity of data scientists by automating the more mundane tasks and freeing up time for innovation. AutoML with transparency can also guide and educate users on how to get the...

It’s time for the CIO to take their opportunity – with IT to secure business continuity

The last few months have brought in some drastic changes to the way we work and live. One thing that it has highlighted is the extreme value that IT brings to all organisations.

It’s clear to people at all levels of organisations that we’re not just about providing laptops and printers and keeping them running – suddenly we’ve become part of the business continuity team. We’re delivering consistency of service despite what’s happening around the world, and we’re...

Gartner issues six-point plan for CIOs to cure Covid-19 cost-cutting

Budgets naturally need to be redrawn and tightened amid the global Covid-19 pandemic - and according to the latest report from Gartner, CIOs need to focus on a multi-faceted plan incorporating business impact and organisational risk to succeed.

The analyst firm has released a six-step cost optimisation framework which CIOs need to explore. Financial benefit is only one of the steps available - albeit an important one - emphasising the need to focus holistically, and reminding that...

We’re at a turning point for legacy tech: Here are four ways to approach it

Usually, the word “legacy” evokes feelings of tradition, pride, and achievement. But when it comes to today’s business world, it’s not so simple. Legacy technology — computer systems and software from a previous era that are still in use — presents significant challenges to companies.

As technologies and marketplaces evolve, CIOs find it increasingly difficult to integrate new and old tech, yet legacy technology persists for various reasons. Many businesses subscribe...

How to build a business case for endpoint security

Bottom line:  Endpoint security business cases do much more than just quantify costs and benefits; they uncover gaps in endpoint and cyber protection that need urgent attention to avert a breach.

Bad actors and hackers prefer to attack threat surfaces that are isolated, vulnerable with out-of-date security patches, yet integrated into a corporate network to provide access. For these reasons and more, endpoints are now the popular choice for hacking attempts. Ponemon Institute’s...

Six key areas where AI is improving customer experiences

Bottom Line: This year’s hard reset is amplifying how vital customer relationships are and how much potential AI has to find new ways to improve them.

30% of customers will leave a brand and never come back because of a bad experience.27% of companies say improving their customer intelligence and data efforts are their highest priority when it comes to customer experience (CX).By 2023, 30% of customer service organizations will deliver proactive customer services by using...