Sigma Solutions Blog

Why Disaster Recovery-as-a-Service Makes Good Business Sense

Posted by BGrassmuck on Jan 21, 2015 7:20:00 PM

A recent report from MarketsandMarkets estimates that the global market for Disaster Recovery-as-a-Service (DRaaS), the cloud-based disaster recovery model in which a third party provides failover, will grow 55 percent annually through 2018. More and more organizations are recognizing the importance of seamless business continuity and the severe impact of downtime while looking to minimize IT infrastructure costs.

One major reason for the emergence of DRaaS is the cost and complexity of building your own disaster recovery site. While this approach allows you to maintain complete control of all IT infrastructure and data housed at the secondary site, there are significant capital and operational costs. Your organization will have to purchase or rent the property, build the site and implement the system. After implementation, there are ongoing costs for powering, maintaining and securing the site. Storage costs are likely to skyrocket as corporate data is constantly backed up. Because there needs to be a good distance between the disaster recovery site and the primary data center, staffing can be difficult.

Read More

Topics: Disaster Recovery

How Client-Hosted Virtual Desktops Eliminate the Security Risks of BYOPC

Posted by CReed on Jan 15, 2015 8:00:00 AM

Recent Forrester research found that 65 percent of IT professionals in the U.S. and U.K. claim their organizations want to become more employee-centric. 63 percent believe this approach can create competitive advantages. One of the key drivers behind the increased interest in employee centricity is the fact that employees are demanding to choose their own devices.

72 percent of respondents to the Forrester study are now supporting bring-your-own-personal computer (BYOPC) programs. An extension of bring-your-own-device (BYOD), a BYOPC program allows employees to choose and own the laptop and notebook PCs that they use for work purposes. Proponents of BYOPC say it gives employees greater flexibility, especially those who primarily work remotely, and allows employees to serve customers more quickly and effectively.

Read More

5 Mobile Myths Debunked

Posted by CReed on Jan 14, 2015 5:57:00 PM

Mobility in the workforce is an evolving issue. Smart phones, laptops, and tablets are a critical part of our day-to-day work life where collaboration, connectivity, and global workforces are more and more apparent. Unfortunately, there are many misperceptions about how to secure them within the parameters of a company’s different business goals.

Traditional mobile device policies that once said, “Access to company emails and networks is allowed only through your company-provided device” are now a thing of the past. As price points dropped and accessibility to technology grew, more people got their own devices. If everyone has a personal device, lugging around a second phone or tablet for professional purposes is a hassle that many wish to avoid.

Read More

Topics: Workforce Connectivity

Is Your Mobile Environment Being Managed Securely?

Posted by CReed on Jan 12, 2015 8:00:00 AM

A 2014 survey of IT security professionals by Linkedin found that organizations are still trying to wrap their collective heads around mobility. The majority are unprepared for the current spike in mobile users, devices and applications that access the corporate network, and they’re operating at an increased risk as a result.

Although IT has serious security concerns ranging from data loss and unauthorized user access to the downloading of potentially dangerous applications, most organizations aren’t doing enough to prevent any of them from happening. In fact, when asked what tools are used to manage mobile devices, 22 percent said “none.”

Read More

Topics: BYOD, Security

The State of End-User Computing in 2015

Posted by CReed on Jan 7, 2015 4:19:00 PM

The InformationWeek 2015 Consumerization of IT Survey has confirmed one fact that is widely known.
Employee-owned smartphones and tablets are now firmly entrenched in the workplace. Generally speaking, IT managers have begrudgingly accepted this new reality as organizations are recognizing the value of becoming more user-centric. Today’s more informed and empowered employees prefer to use and choose their own devices and applications, and executives are realizing that this can improve productivity, collaboration and customer service.

The benefits of the consumerization of IT sound great in theory, but the real-world implementations of such strategies don’t always work. Unlike the traditional IT model in which every employee had the same desktop PC with the same operating system and applications, the user-centric IT model is overflowing with different devices, operating systems and applications. When technology acquisition is taken out of the hands of IT, with or without IT’s knowledge, security and management becomes much more complex and fraught with risk.

Read More

Secure Your Mobile Workforce with Expert Help

Posted by CReed on Jan 7, 2015 3:21:14 PM

Imagine yourself a jewel thief and going outside one morning to see that everybody was covered in priceless baubles, bangles, and gems. This is how the cyber thief feels walking around the airport, or down Main Street, or at the corporate campus. Tablets, smartphones, and laptops are the doorways to gold mines of data. They are everywhere, being carried in backpacks, purses, and pockets by the ever-growing mobile workforce. Or at least until they’re stolen. According to Consumer Reports, over 3.1 million smartphones were stolen in the US in 2013 alone.

Small or midsized businesses should not have to fight these cyber thieves alone. With more users connected to your network from a wider range of entry points, there are more endpoints to attack and more ways to attack them.  According to Symantec’s Internet Security Threat Report 2014, there’s been a 91 percent increase in targeted attacks since 2012.

Read More

Topics: Workforce Connectivity

Adapting to the Challenges of the Mobile Workforce

Posted by CReed on Dec 23, 2014 2:19:00 PM

In a recent post, we discussed some of the approaches organizations might take to get a handle on the issues associated with a mobile workforce. Whether a company decides to provide policy-compliant mobile devices to certain employees, or they embrace BYOD and BYOA (Bring Your Own Application), security challenges remain about the same.

Below is what a Ponemon Group survey, commissioned by Raytheon, found about BYOD trends in the workforce:

Read More

Topics: BYOD

3 Approaches to Managing Mobile Workforce Technology

Posted by CReed on Dec 16, 2014 2:57:00 PM

One of the most dramatic shifts in enterprise computing has been the phenomenon known as BYOD (Bring Your Own Device). On one hand, the fact that employees are willing to use their own mobile devices to do company business is a win-win for everybody. On the other hand, now you’ve got employees accessing the company network from, well…anywhere.

As an article in NetworkWorld puts it, “The future of end user computing is here today… and it’s in your pocket. And your house, your office, and your favorite seat on the 8 a.m. train. It’s wherever you are.”

In other words, if there’s one key trend that is affecting the workplace, it’s that the workplace itself is fast becoming history. Not only do workers want to be able to work from wherever, they want to use the devices and the applications of their choosing. Here is a look at three ways the industry is addressing the IT challenges of the mobile enterprise.

Read More

Topics: Workforce Connectivity

The Global Workforce is Getting Closer by the Day

Posted by HReal on Dec 9, 2014 3:07:00 PM

Today’s business landscape isn’t the orderly rows of employees in a single location that it once was. Instead, employees may be scattered across the state, nation, or even the globe. While one employee sits in a cubicle, another is working out of a home office, and yet another is working in the company’s international location.

The wide expansion of workspaces has changed the way communication and collaboration needs to take place in business environments. Work environments are heterogeneous by nature, and that trend is here to stay for a number of reasons including cost, convenience, and greater overall agility.

Read More

Topics: Workforce Connectivity

Have IT Personnel Lost Control Over their Own Departments?

Posted by HReal on Dec 2, 2014 10:43:00 AM

Information technology consumption within business environments has changed drastically from what it once represented. Consumers have more command over their devices and they are calling many of the shots on specific IT usage. If they want to access certain applications, or if they want to utilize certain devices, they are starting to gain more unrestricted access without the constant checkpoints IT employs.

Traditionally, IT professionals have been the middlemen between the technology and the user. They would select and approve the technologies that were used by the entire organization. These individuals have acted as gatekeepers to ensure that the right technology is chosen to support the business.

Read More

Topics: Workforce Connectivity

Subscribe to Email Updates