By Denis Pombriant on July 16, 2018
So far, the trade war is limited to actions and reactions related to durable things that trade throughout the global economy—cars, steel, and aluminum for instance. Add bourbon and Harleys for good measure. But will that remain the battleground or should we expect greater contentiousness around services, specifically software as a service and CRM […]
By Louis Columbus on July 12, 2018
Identities, not systems, are the new security perimeter for any digital business, with 81% of breaches involving weak, default or stolen passwords. 53% of enterprises feel they are more susceptible to threats since 2015. 51% of enterprises suffered at least one breach in the past 12 months and malicious insider incidents increased 11% year-over-year. These […]
Posted in Business, Featured Posts, Technology / Software | Tagged byline=Louis Columbus, Centrify, CIO, CSO, cybersecurity, machine-learning based security, Next-Gen Access, NGA, Zero Trust Security, ZTS | Leave a response
By Louis Columbus on July 4, 2018
Executive Management, Operations, and Sales are the three primary roles driving Business Intelligence (BI) adoption in 2018. Dashboards, reporting, end-user self-service, advanced visualization, and data warehousing are the top five most important technologies and initiatives strategic to BI in 2018. Small organizations with up to 100 employees have the highest rate of BI penetration or adoption […]
Posted in Business, Featured Posts, Technology / Software | Tagged analytics, BI, Business Analytics, business intelligence, Dresner Advisory Services, Louis Columbus' blog, predictive analytics | Leave a response
By Louis Columbus on July 1, 2018
Employee identities are the new security perimeter of any business.
80% of IT security breaches involve privileged credential access according to a Forrester study. According to the Verizon Mobile Security Index 2018 Report, 89% of organizations are relying on just a single security strategy to keep their mobile networks safe.
Posted in Business, Featured Posts, Technology / Software | Tagged byline=Louis Columbus, Centrify, Centrify Analytics Service, Next-Gen Access, NGA, Verizon Mobile Security Index 2018 Report, Zero Trust Security | Leave a response
By Michael Krigsman on June 28, 2018
Software runs our companies and lives but remains complex, hard to buy, and expensive to implement. Two top industry observers offer important observations and advice for buyers, vendors, and technologists. Watch for the special advice to avoid “profiteers and charlatans!”
By Dave Kellogg on June 28, 2018
This post won’t save your life, or your company. But it might save you a few precious hours at 2:00 AM if you’re working on your company’s SaaS metrics and can’t foot your quarterly and annual churn rates while preparing a board or investor deck. The generic issue is a lot of SaaS metrics gurus […]
By Vinnie Mirchandani on June 28, 2018
I am excited to start a new series of interviews with tech executives who have seen the industry evolve over a minimum of two decades. They have helped analyze, envision, develop and take to market some of the most influential technology the world has seen. And they have done it well mile after mile as […]
By Michael Krigsman on June 25, 2018
Read this in-depth discussion with Deloitte on new research into diverse technology teams. Learn from the CIO of Fox Networks, who was previously CIO of Burberry, and learn key lessons on achieving high-performing IT.
By Vinnie Mirchandani on June 19, 2018
You have read analysis from me and others about SapphireNow. I wanted to get a post-conference perspective from a SAP executive and I caught up with Nick Tzitzon, Executive Vice President, Marketing and Communications Overall Vibe It can be tempting to look at so many different things and slice and dice the success of an […]
By Michael Krigsman on June 18, 2018
The chief information officer explains how technology is transforming its core business and related services. This inside look offers important lessons to anyone interested in digital. He also reveals secret truths behind the “close door” button.