While the improvement of IT management remains a goal for all enterprise IT teams, the true aim for IT departments today should be to simplify IT in order to drive business agility. Unfortunately, simplifying IT isn’t so simple.
Last month saw Exponential‐e’s inaugural event at the Belfry, bringing together customers and prospects for a morning session exploring the cutting edge of hybrid cloud strategy. Encompassing ideas such as SD‐WAN being used in conjunction with Exponential‐e’s recently launched Cloud Management Platform (CMP), the event was teeming with attendees and conversation led by James Varnish, head of the Midlands team.
Today, innovation in technology is changing the way digital media is consumed more quickly than ever before. Tech-savvy consumers are creating an ever-growing market for data-intensive HD and UHD content, consuming content online, on the move and on-demand.
At this point, to say that technology has transformed every aspect of our personal and working lives is a bit redundant. What’s more interesting is to take a deep dive into the infrastructure that’s underpinned modern innovation as we know it. And that infrastructure, more often than not, has been cloud.
Consider the key technological achievements that have made the past decade so memorable: self-driving cars, streaming services, digital healthcare that helps people live longer, crowdfunding and cryptocurrencies. All have been powered by cloud computing.
With the importance of cloud in mind, we are delighted to announce that Exponential-e’s reputation for cloud excellence was recognised last weekend by not one but two key awards ceremonies: the CRN Channel Awards and the IAB BaM™ Awards 2018.
By 2019, 1 to 2 million roles within cyber security will be unfulfilled. That’s a figure that should strike fear into the heart of even the most stoic of business people. The threat of cyberattacks is growing quickly, and there aren’t enough skilled people in place to control the wildfire.
This global cyber security skills crisis isn’t exactly a new problem, though. Over the last 2 years, 40% of cyber security roles remained unfulfilled, despite an increase in job postings of over 74%. This is a problem, then, that’s been smouldering in the background for a long time, and consequently now has the potential to create some serious destruction.
76% of organisations are implementing the cloud or already operating in it. And no wonder: Cloud can do great things for your organisation. It can provide increased data storage capacity, improved business continuity, and potential cost reduction. However, using the cloud brings significant security risks with it, including data loss and threats to data privacy. Continue reading “Multi-cloud and security challenges”
Cyber security is more complex now than ever before, and the implications of a cyber-attack can be much more disastrous. Organisations must consider not only the financial implications but the reputational damage that can arise following an attack. The proliferation of social platforms and the increasing needs of regulation, mean that security breaches can be publicised across the globe within minutes. Whilst the cost of launching a cyber-attack has reduced over the last few years, the cost of defence has risen. This is because there’s a greater variety of attack vectors – means by which an attacker can gain access to your network. The methods deployed are so vast, compared to previously, that it makes it increasingly difficult to build an effective defence against. Highly sophisticated cyber-attacks are also using automation techniques to maximise their damage, to the extent where one piece of code can be used many thousands of times.
The 2017 Thales data threat report presents the corporate view of security very well. And as any enterprise security team will tell you the report is entirely reflective of what they are having to live through.
The adoption and proliferation of the Internet of Things (IoT) is unstoppable. Even though we have had massive DDoS attacks orchestrated using IoT, IP enabled CCTV Devices have been compromised and marshalled into a bot army of significant breadth and size; even though the implication of poor or shared cryptography of these IoT devices is well documented and a fantastic risk to any user/owner of these devices they are still being adopted.