users - News, Features, and Slideshows


  • ‘The user is today’s new corporate security perimeter’

    'The security perimeter in organisations is dissolving - IT and security management can no longer count on well-defined network security perimeters to protect their organisations,' according to the latest Global Threat Intelligence report.

    Written by Divina Paredes19 May 15 06:00
  • What to do with CRM systems after a merger

    Extensive academic research shows that the majority of mergers fail to increase shareholder value, often because the integration of acquired business units takes longer than anyone planned. So the ability to effectively integrate the information systems of merged business units is a key success factor for any acquirer.
    Even though there are a lot of corporate integration consultants, the execution of their strategic plans seems to go awry...particularly when it comes to CRM systems.

    Written by David Taber24 March 10 23:00
  • ‘Invisible IT’ gets ugly

    Forrester says ‘invisible IT’ comes in two forms – shadow IT systems implemented in business units outside of IT’s sight; and the unplanned, untracked and unmanaged requests of IT.
    Invisible IT results from a lack of process and discipline by both IT and end users when it comes to requesting and providing IT resources, notes analyst Craig Symons in a recent Forrester report. By extending IT governance beyond strategic requests to tactical requests, through service portfolio management and a service catalogue, IT can ensure all its efforts are tracked and managed, bringing a clear picture of IT demand.

    Written by Divina Paredes09 Aug. 07 22:00