Skip to main content
Main Menu
  • Next Generation Data centre Cycle III - it's the nuances that matter

    Cycle II of Quocirca's NGD Index shows modest growth in the sub and main indices. However, granular analysis uncovers some interesting findings, including that a simple change of mindset can have a massive impact on how well an ITC platform can support the business.

    Read full Report
  • BYOD - who carries the can?

    There is a trend among employees to want to use their personal choice of mobile device in the fulfilment of their work commitments. While this appears to bring many benefits for the employee to select their preferred device or devices and, on the face of it, reduces upfront costs for their employer, it does introduce significant on-going costs and risks for the organisation. However, with many appealing mobile consumer devices being offered, the trend is likely to increase, so organisations need to work out suitable strategies and policies to manage this complex and hybrid situation in the best interests of both themselves and their employees.

    Read full Report
  • Mobile Expense Management

    Managing mobile costs is a challenge for all organisations, especially as responsibilities and budget authority often sit in several places—IT, finance, personnel, managers and, of course, the employees themselves. This situation becomes even more complex and problematic for those organisations that span more than one country or have to use multiple suppliers within one country. Getting to grips with these costs in a way that does not undermine the value of mobile flexibility is paramount, and organisations need to gather sufficient detail to effectively manage and analyse their mobile costs.

    Read full Report
  • Preparedness for the CRD IV

    Financial institutions across the EU have been faced with getting ready for the latest round of regulation around the Capital Requirements Directive, CRD IV.

    Read full Report
  • The trouble heading for your business

    Targeted attacks and how to defend against them. In the past, businesses that invested in effective IT security could reasonably expect that random attacks would pass them by and leave their mark on less well-defended organisations. However, this is no longer the case. The growing aspirations of cyber-criminals to seek greater profits and the rise of hacktivism have led to more targeted attacks. If it’s your business attackers are after, they are more determined than ever to find a way in.

    Read full Report
  • Printing - A False Sense of Security?

    As more businesses move to a shared networked multifunction peripheral (MFP) environment, left unprotected, it is all too easy for unclaimed confidential or sensitive information to fall into the wrong hands – either accidentally or intentionally.

    Read full Report
  • The identity perimeter

    Using advanced single-sign-on to enable open business communications. In most cases, only when the identities of the individuals requesting to use IT resources are firmly established should access be granted. This applies to resources provided internally by organisations and to those sourced from third parties such as software-as-a-service (SaaS) providers. For most organisations this includes external users from partners and customers as well as employees. Since many of these access requests are coming from users in remote locations, often via mobile devices, centralised provisioning and de-provisioning is essential. Advanced single-sign-on systems are one of the most effective ways to achieve these goals.

    Read full Report
  • Using ICT financing for strategic gain

    Financing is used in many ways across small and medium sized organisation - for office space, cars, office equipment and so on, yet IT financing seems to have been passed by. This research looks at perceptions around ICT financing.

    Read full Report
  • Smart self-service - a guide for buyers

    When looking for a self-service knowledge solution, it can be hard to distinguish between vendors. Most make very similar claims about the capabilities and benefits of their product. To make an informed choice, it is necessary to go beyond marketing rhetoric and assess the specifics of each vendor’s offering. Does the vendor’s feature set support the way in which you envisage implementing self-service? Can the vendor help to deliver an ideal customer experience? Just as important, is the vendor someone with whom you can see yourself happily working?

    Read full Report
  • The Next Frontier for Managed Print Services

    As businesses enter next generation MPS engagements, service providers are evolving their service breadth to include business process services (BPS) and IT services (ITS). The bar is being raised in terms of what businesses expect from their MPS providers. Next generation engagements are all about deep collaboration in order to deliver the continuous business improvement that today’s businesses are demanding.

    Read full Report

Pages