How customers capture real economic value with zero trust

Hub-and-spoke networks and castle-and-moat security architectures were designed for days gone by when users, apps, and data all resided on premises. But in today’s world, endlessly extending the network to more branch offices, remote users, and cloud apps, and defending network access through ever-growing stacks of point product hardware appliances breeds significant costs. The Zscaler…

Thinking of hibernating through the metaverse winter?

If you’re skeptical about dipping your enterprise’s virtual toes into a metaverse, rightfully so. While the roots of the metaverse date back more than 70 years, the concept gained instant credibility when it landed on Gartner’s 2022 Hype Cycle for Emerging Technologies with a “Plateau of Productivity’ timeframe of “more than 10 years.” Around the…

4 remedies to avoid cloud app migration headaches

Once enterprises commit to running business-critical applications in the cloud, they rarely move to another provider. One big reason: they’re often locked into their chosen provider’s ecosystem. The cost of migrating is simply too high, says Sid Nag, VP of cloud services and technology at Gartner. “But if you do your planning exercise properly, you…

Steps Gerresheimer takes to transform its IT

By mid-2023, Walldorf-based Gerresheimer had its IT strategy revised, and a central component of this was its cloud journey, for which CIO Zafer Nalbant and his team built a hybrid environment consisting of a public cloud part based on Microsoft Azure, and a private cloud part that runs in a data center completely managed by T-Systems. And according…

The Importance of Identity Management in Security

It’s ever more challenging in today’s work-from-anywhere world to prevent cybersecurity breaches. And while all organizations work hard to prevent attacks through traditional security measures such as multi-factor authentication, patching, training, and more, the bad guys increasingly find their way in through poorly thought-out, scattered access and identity management practices. The solution, we’ve seen in…