

This report focuses on a recent quantitative research study conducted with UK and Ireland IT decision makers (ITDMs). It explores how finance and insurance organisations are approaching cloud adoption, where the key challenges and apprehensions exist, and how organisations can look to overcome these challenges through...
Published: Dec 22, 2020


The phrase ‘business as usual’ has a reassuring quality. It represents an ideal state in which the company is free to conduct its operations without disruption or interference. As enterprises face increasing volumes of cyber security threats, however, the phrase seems almost utopian. Just as you wouldn’t...
Published: Nov 30, 2020


Organizations must empower, inspire, and enable their employees to serve their customers better. And employees want the best technology, devices, and applications at their fingertips to do so.
All workers have an identity, which is shared across their values — and this is exactly what organizations...
Published: Nov 03, 2020


This UK Public Sector Databerg report surveyed senior Public Sector decision makers on the data challenges and issues they face. It highlights, for the first time, the degree of understanding their growing data estates now need to meet strict information governance and security requirements.
Published: Dec 22, 2020


The decision of where to run applications has grown steadily more complex and cloudier over the past decade. On the heels of the transition from physical to virtualized infrastructure, public and private cloud infrastructure consumption models came to the fore.
Cloud consumption allows end-users to provision,...
Published: Nov 12, 2020


The coronavirus pandemic has left the world looking very different at the end of the quarter than it did at the beginning. For starters, millions of workers are out of the office and working from their homes. This change in scenery, combined with safe social distancing efforts that help prevent the spread of COVID-19,...
Published: Nov 09, 2020


Today’s most potent cyber threat isn’t a zero-day vulnerability, new malware or the latest exploit kit. It’s your own users. That’s because today’s attacks target people, not IT infrastructure. No matter what form they take, most cyber attacks need a human victim to help activate them. They...
Published: Nov 24, 2020


Defend your organization from evolving ransomware attacks. Learn what it takes to reduce risk and strengthen operational resiliency.
Published: Dec 22, 2020


All of a sudden, you (and everyone else) found yourself working from home (WFH). The one advantage was the lack of a soul-crushing commute. Unfortunately, many of your co-workers had never really signed in from home, so help desk calls reached an all-time high. Questions ranged from how to access protected files, to whether...
Published: Dec 22, 2020


In the decade since the 2009 economic downturn in the UK, there have been a number of changes in the construction industry. With consolidation in the sector and intensification of competition, companies have found themselves having to identify technology to help them become more efficient not only in the bidding process...
Published: Jan 18, 2021


The pandemic is fast tracking the digital transformation of organisations in China (and the region) as an increasing number of companies commit more resources to DX, to not only remain resilient during the pandemic, but to thrive after the crisis. The lesson from the China story is that despite the gloom and doom brought...
Published: Nov 16, 2020


When a cyberattack occurs, speed is one of the most critical factors in the remediation process. Cyber-prepared security teams should aim to eradicate threats from the environment in under an hour to effectively combat sophisticated cyber threats and avoid the damage a successful breach can inflict on an organization’s...
Published: Dec 02, 2020


A hybrid cloud operating model can provide significant benefits for traditional and modernized IT. However, inconsistencies in operations management tools and processes put enterprises at risk. With VMware Cloud Foundation™, organizations build consistency across all layers of their infrastructure with a consistent...
Published: Jan 14, 2021


Ransomware attacks continue to be top-of-mind for business and IT leaders. And for good reason. Ransomware compromises access to your organization’s lifeblood—data. Consequences can be dire: Pay perpetrators to (maybe) unencrypt your data, stumble with decryption tools, or gamble on recovering from backups....
Published: Nov 27, 2020