Skip to content

Archived CEO Blogs

A Forward Look: Riding the Digital Waves of 2015

At year’s end, I always find myself looking back over the previous 12 months and then, inevitably, I can’t help but look forward to the coming year. Since I’m in the information technology business, this exercise can be pretty interesting.

Technology trends translate into products and services that matter, but when you hear about technologies like web-scale IT, cloud bursting, advanced analytics, self-aware apps, context-rich systems, software-defined networks, etc. – well, it’s hard to keep your eyes from glazing over. So I’ll narrow it down to two waves coming at all of us:

Tim Burke

Keep Your Guard Up During the Holidays

The holiday season is upon us – which means it’s also cyberattack season. Though, arguably, 2014 has turned into an entire year of the cyberattack: one study estimates 2014 will rack up an incredible 42.8 million cyberattacks worldwide. That’s more than 117,000 attacks every day!

Which leads me to the topic of firewalls. It’s been 20 years since the first firewalls were deployed to make a perimeter gateway barrier blocking unwanted IP traffic.

Since then, firewalls have evolved to keep pace with new technologies, the ever-increasing complexities of network infrastructures and applications, and new business models that have spawned things like cloud computing and mobile apps. These days, companies deploying firewalls and advanced perimeter controls see a 15% return-on-investment .

Tim Burke

Are You Ready for Your Own Bleeding Edge?

Manufacturers love buzz words. And, it’s true, most of us are susceptible to catchy phrases. One that’s caught my attention is ‘bleeding edge’ — used to describe the very, very latest technology product or service. It’s a heady feeling, being at the forefront of technology, and the urge to acquire the newest and best can be downright irresistible, as evidenced by sales of the iPhone 6. Yet there are times when you should resist. Being on the bleeding edge can

Tim Burke

Giving Thanks During the Season of Patching

As the nights grow longer and colder, giving thanks for all that’s warm and light-filled makes wonderful sense. We are, in effect, expressing appreciation for feeling secure and safe.

In fact, this is a time of year when it’s a good idea to pay particular attention to security — especially data security. With the season of holiday gift-buying underway, opportunities for data thieves, hackers, and malware abound.

This isn’t only a concern for retailers and credit card firms. We’re all vulnerable and we all have to continually tend to the security of our businesses. 

Tim Burke

Planning for 4 Key 2015 Technology Challenges

Four technologies will very likely impact your business in 2015 — whether or not you explicitly consider them in your planning. Which is to say, ignore them at your peril: 

Tim Burke

3 Steps to Closing the BYOD Gap

In my last post, I discussed the gap between business units that enthusiastically embrace BYOD and IT departments, where BYOD is regarded with more hesitation.

Yet it’s clear: BYOD is not only here to stay, it is quickly becoming a dominant force that IT departments must deal with. And in most circumstances “just say no” isn’t an option; BYOD offers employees too many rich opportunities to boost productivity, innovation, and collaboration.

So what’s an IT department — your IT department — to do?

Tim Burke

Contact Quest Today  ˄
close slider