Blog posts by Warwick Ashford

Blog

EIC Speaker Spotlight: Gerald Horst on Effective Integration of Marketing, CRM, and Customer Identity and Access Management

Gerald Horst, PwC’s Digital Identity team leader in EMEA, is to deliver a presentation entitled Modernizing the Customer Journey at the European Identity and Cloud Conference 2021 . To give you sneak preview of what to expect, we asked Gerald some questions about his planned presentation. Why is there an increasing interest in digital transformation and how has the pandemic impacted digital transformation projects? Well, every year, PWC surveys CEOs across the globe about their strategic priorities in this “new normal”. This year, actually more than...

Blog

EIC Speaker Spotlight: Jackson Shaw on Identity and the Rise of Platforms

Jackson Shaw, technology sector veteran and Chief Strategy Officer at Identity Access Management firm Clear Skye, is to deliver a keynote presentation entitled Identity and the Rise of Platforms at the European Identity and Cloud Conference 2021 . To give you a sneak preview of what to expect, we asked Jackson Shaw some questions about his planned presentation. You say we are entering a new era of SaaS with new kinds of enterprise platforms, what do you mean by that? What I'm trying to basically say is that what we've...

Blog

Microsoft Acquires Nuance to Drive AI-Based Workplace Innovation

Cloud, AI software, and voice recognition firm Nuance is Microsoft’s latest strategic acquisition aimed at putting the tech giant in a strong position to shape healthcare and workplace applications of the future. Microsoft has agreed to acquire Nuance for around $19bn and the deal is expected to close before the end of 2021. First Focus on Healthcare The acquisition has the potential to put Microsoft at the forefront of workplace innovation due to Nuance’s AI software expertise focusing on voice recognition, stemming from core algorithms developed in the early 1980s by...

Blog

Elements of a Disaster Operations Plan

If anyone in any organization was in any doubt about the importance of having a Disaster Operations Plan, that has surely changed since the outbreak of the Covid-19 pandemic. Some organizations have coped better than others, but every organization should either be working on developing a Disaster Operation Plan or on improving the one they already have by identifying where the plan did and did not work well. Design a plan based on resources you already have A Disaster Operation Plan is a crisis-specific plan that builds off what an organization should already have in place. The...

Blog

The New Normal Post Covid-19

As soon as national lockdowns began to limit the spread of Covid-19 it was clear that the world would never be the same again, and last week’s Microsoft Build conference has highlighted what some of those changes will be, starting with the event itself being fully virtual for the first time. Remote working set to increase longer-term While remote working was becoming increasingly popular in the run-up to the Covid-19 crisis, few organizations were well equipped to accommodate this. In the past two months, however, just about every organization has had to find a way of enabling...

Blog

Working Securely at Home During the Pandemic

As more people are working from home than ever before, there is an increasing demand for communication services. But security needs to be a key consideration as businesses adapt to a new way of working, as my colleagues John Tolbert , Matthias Reinwarth , and Alexei Balaganski have pointed out in their recommendations on responding to the Covid19 pandemic. The move to cloud is obvious For many organizations, meeting the challenges presented by the pandemic means making a quick move to the cloud, but as Matthias points out, this must be managed properly with security in mind....

Blog

Mitigate Citrix Vulnerability in Face of PoC Exploits

Despite a Citrix warning in mid-December of a serious vulnerability in Citrix Application Delivery Controller (ADC) and Citrix Gateway (formerly NetScaler and NetScaler Gateway), thousands of companies have yet to put in place the recommended mitigations . In the meantime, several proof of concept (PoC) exploits have been published on GitHub, making it extremely easy for attackers to gain access to networks and impersonate authorized users. Thousands of Citrix systems still vulnerable Initial estimates put the number of vulnerable systems at 80,000 in 158 countries. Researchers...

Blog

Regulatory Compliance a Potential Driver of Cloud Migration

Newly announced AWS offerings of Access Analyzer, Amazon Detective and AWS Nitro Enclaves discussed in my last blog post, further round out AWS’s security services and tools such as Amazon GuardDuty that continuously monitors for threats to accounts and workloads, Amazon Inspector that assesses application hosts for vulnerabilities and deviations from best practices, Amazon Macie that uses machine learning to discover, classify, and protect sensitive data, and AWS Security Hub, a unified security and compliance center. These new security capabilities come hard on the heels of...

Blog

Breaches and Regulations Drive Better Security, AWS re:Invent Shows

The high proportion of cyber attacks enabled by poor security practices has long raised questions about what it will take to bring about any significant change. Finally, however, there are indications that the threat of substantial fines for contravening the growing number of data protection regulations and negative media exposure associated with breaches are having the desired effect. High profile data breaches driving industry improvements The positive effect of high-profile breaches was evident at the Amazon Web Services (AWS) re:Invent conference in Las Vegas, where the cloud...

Blog

The First Step to Cloud Is Not Technical – an AWS Perspective on Cloud Migration

As usual, Amazon Web Services (AWS) is making a slew of announcements at its reinvent conference in Las Vegas, and as expected, the key ones related to making it easier for organizations to move workloads to the cloud, keep data secure and get more value out of their data with services supported by Machine Learning. However, one of the most interesting points made in the keynote by CEO Andy Jassy was not the power of the cloud transform business, revolutionize industry sectors or the latest AWS server processor chip and services, but about the common, non-technical barriers...


KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Stay Connected

KuppingerCole on social media

Subscribe to our Podcasts

KuppingerCole Podcasts - listen anywhere


How can we help you

Send an inquiry

Call Us +49 211 2370770

Mo – Fr 8:00 – 17:00