IAM Security Orchestration

IAM Security Orchestration

Customer Identity and Access Management Using Identity Orchestration Technologies Five Things CMO’s Need to Know About Customer Identity and Access Management There was a time when a CMO’s didn’t need to worry about Customer Identity & Access Management (CIAM)...
Gartner’s 1st Magic Quad for RPA

Gartner’s 1st Magic Quad for RPA

Gartner publishes first Magic Quadrant for robotic process automation market (RPA) Gartner Inc. has published its first Magic Quadrant for the robotic process automation software market, shining a light on the leading players and key trends in the rapidly growing...
Evolution of Cloud Contact Centres

Evolution of Cloud Contact Centres

The Evolution of Cloud Contact Centres : CCaaS Round Table  What’s next in the Contact-Centre-as-a-Service (CCaaS) environment? Views from Genesys, 8×8, NICE-inContact, Content Guru The cloud contact centre is growing at an amazing pace. As more companies...
What’s the new Chief Data Officer?

What’s the new Chief Data Officer?

Why your data officer is now your head of digital value In a recent Fortune 1000 survey it was found that 68% have appointed a Chief Data Officer compared to 12% in 2012 (Source: NewVantage Partners) A CDO is a senior executive responsible for organization-wide...
Disruptive Tech 2020

Disruptive Tech 2020

Disruptive Technologies: Five areas to keep a watchful eye on technology trends for the 2020’s Transitions, disruptions, and transformations … and the steps you can take in 2020 to harness their potential ‘“Scanning the vendor blogs on tends for the twenty...
New Enterprise SD-WAN

New Enterprise SD-WAN

Magic Quadrant for WAN Edge Infrastructure Published 26 November 2019 WAN edge infrastructures are undergoing major changes as infrastructure and operations leaders responsible for networking face dynamic and expanding business demands. I&O leaders must identify...
Boardroom Technology time bomb

Boardroom Technology time bomb

Board member time bomb for those not focused at Technology We should actually be concerned about things boards are ‘NOT’ discussing There have been many articles written about placing IT technology agendas on the boardroom table and also many recent blogs about the...
IT role in Corporate Acquisitions

IT role in Corporate Acquisitions

IT role in Acquire, or Not-to-Acquire The changing landscape of the IT Technology arena within corporate Merger or Carve-out To acquire, or Not-to-acquire – The question most CEOs ask their CFO is:- Will the transaction drive financial rewards and what are the risks,...
Hiring the old guy

Hiring the old guy

Do you or don’t you, hire ‘the old guy’! Perhaps I am just getting a bit older, but the IT industry seems to be more of a game for younger people these days. Although, to be fair, Police Officers are looking younger all the time too. “As time goes by attending...
Website Hacking on the increase

Website Hacking on the increase

Here are the top 6 ways websites get hacked, according to Google Google recently noted that it had seen a 32% rise in hacked website over 2016. Here are the most common tactics it found. In 2016, the number of hacked websites rose by 32%, according to a blog from...