Most employees want to be productive. As cloud service consumers, they have become accustomed to finding a tool or app that will help fill a need and simply buy it without obtaining approval from the organization first. This practice of employees bypassing IT management to procure tools and services without proper vetting has infiltrated the workplace and is known as Shadow IT.
Over the past four decades, organizations of all sizes have seen a significant change to how they do business, due to evolving technologies. And now, as we approach the end of the 2010's decade, the term “Digital Transformation” is abound and you might ask, "Haven’t we already done enough transforming?"
I packed my cloud bag and in it I placed...
As we've begun to adopt a myriad of cloud-based services, our network perimeter has become more expansive and therefore, potentially more porous. Cloud services may need additional firewall ports open, which is equivalent to opening more doors into your home. On top of this, your employees are now working wherever they want and they’re using a handful of different devices. Last but not least, your data is racking up an impressive amount of frequent flier miles as it travels and gets stored in platforms strewn all across the country.
Over the past several years, the demand for cloud infrastructure services has quickly grown with 2017 revenues reaching well over $23.6 billion, up 93% from the previous year. Recognizing this, Microsoft has made massive investments in data centers all around the world to become the leader in the global public cloud services market along with having the most comprehensive set of compliance offerings of any cloud service provider.
Are you aware of the amount of data you have? Do you know how to manage your data growth? Do you know how long it will take to recover your critical data and applications in the event of a disaster?
First, let's cover some important dates that all businesses should be flagging on their calendars.
I spent a lot of time early in my career solving complicated problems related to security. In the late 1990's, I consulted as a civilian for the NSA to help automate the 'need-to-know' access of their internal web infrastructure and documentation. I followed that with some time as a Reserve Information Operations Officer for the U.S. Army, and then working for financial services companies including VISA during the birth of the PCI standards. Needless to say, the security field is one with overwhelming depth and it can be challenging for companies to make an iterative, incremental plan to become more secure.
The New Year is a great time to revisit your technology strategy. IT Strategy is getting more and more important every year - whether you are a software company who makes a living with technology or someone running a law firm or other small business - technology should be making you better. Far too often, however, we lose sight of our strategy dealing with the day-to-day bustle of running our business while keeping older systems running. The New Year is a great time to step back and revisit the key components of your IT strategy. Here are five strategic IT investments every company should be making in 2018:
There are many benefits to "moving to the Cloud," or adopting "Cloud Courage," as we, at Systems Engineering (SE), like to put it. In addition to keeping up with the way in which technology is moving, it's also important to look at benefits such as CSP billing. Throughout this article, I will discuss what CSP billing is, how it works, and the various benefits involved.
As we look to the close of 2017 and look forward to all that is awaiting us in 2018, local businesses have made great advances in moving portions of their operations to the cloud, thus providing their employees with access from anywhere on any device, and at any time. One of the many cloud migration themes we've seen in 2017 is the movement to Microsoft Office 365. This transition is becoming more and more popular among businesses looking to collaborate securely and efficiently.