Skip to content

Archived CEO Blogs

Developing the IT resilience your enterprise needs

These days, most enterprise systems, applications, and workloads are deemed mission- or business-critical . So, in addition to redundancy and high availability, discussions about business continuity and disaster recovery focus on IT resilience architectures employing multiple geographically-distributed data centers that use live application failover to prevent downtime.

Tim Burke

BC/DR planning coherence: Stepwise toward business resilience

As I mentioned in my last post, 68% of those in organizations committed to a multi-site resilience strategy – e.g., using Disaster Recovery as a Service (DRaaS) , shifting IT infrastructure to a managed service provider environment , or deploying hybrid solutions – have confidence that their IT environments will perform as expected during unplanned downtime.

Tim Burke

The 3 IT Infrastructure Merger Imperatives

Whether it’s a complex corporate merger like the one Maria Gollnick of BloodSource has dealt with (see page 1 of our Strategic Advisor Newsletter) or, say, the shifting of an on-site infrastructure to a cloud environment, the challenges of merging/ consolidating IT infrastructures can be overwhelming.

Even modest consolidation involves networks, data centers, hardware, applications, clouds, backup plans, security policies, business and compliance processes, anticipating future needs and technologies, and more — all of which must be understood and then integrated into a new, efficient IT environment.

Regardless of any given IT infrastructure consolidation’s particulars, they all share these three imperatives, on which you should focus before beginning the actual work of merger/consolidation:

Tim Burke

Is your business prepared for unplanned downtime?

Your answer may depend on your job title. In one recent survey , 70% of C-level executives declared their firms “very prepared” – but fewer than half of the IT people at those same companies agreed.

Uh oh.

Tim Burke

Facing down cybercriminality: 3 strategies for protecting your business

Those of us devoted to securing enterprises can tell you that cybercriminality will grow significantly as it continues to exploit current information technology trends – widespread adoption of mobile devices and apps, increasing realization of the vast potential of IoT (Internet of Things), and the intensifying digital interconnectedness of nearly everything.

Tim Burke

Contact Quest Today  ˄
close slider