Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…

Identity management: how the #cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…

Identity management: how the cloud can help your business

The risk of attack is increasing, but few small to midsize businesses are taking the basic measures needed to prevent it. The costs incurred from a compromise are vast; damaged systems and software must be replaced – and that’s on…

What to Look for When Hiring an IT Consultant

Just because someone has the words "IT consultant" printed on a business card doesn't mean he can solve your particular technology challenge or will work well with your IT or management team. So how do you find the right IT…

What to Look for When Hiring an IT Consultant

Just because someone has the words "IT consultant" printed on a business card doesn't mean he can solve your particular technology challenge or will work well with your IT or management team. So how do you find the right IT…

What to Look for When Hiring an IT Consultant

Just because someone has the words "IT consultant" printed on a business card doesn't mean he can solve your particular technology challenge or will work well with your IT or management team. So how do you find the right IT…

Facebook chat on ‘Future on Cloud Computing’ – Join The Conversation!

                Greyhound Research is featuring in a Facebook chat organized by IBM on the 'Future of Cloud Computing'. Exchange thoughts with our Chief Analyst & Group CEO, Sanchit Vir Gogia, and other esteemed…

To charge or not to charge?

The pressure to expand IT infrastructure coupled with the need to minimise costs has heightened the demand for chargeback systems. If done well, a chargeback mechanism allows IT costs to scale up or down based on demand and usage, say…

Data Security – The Questions, Solutions and Do’s and Don’ts

At a recent tweet chat organized by Greyhound Research (corresponding hashtag: #SecurityChat), an esteemed group of panelists discussed 'Security in the New IT World'. The conversation revolved around  various facets of security issues plaguing todays enterprises, particularly impact of emerging technologies…

So What’s The Fuss With These Technologies Really About?

CIOs are usually bombarded with various cycles of prediction and reports made by IT research companies/consultancies and vendors to give them a fair idea of what technologies are going to make it big. But, have these technologies really had the…

Questions CIOs Often Ask On Cloud Security

A discussion with IT leaders and managers on cloud security is always an interesting one. While I’ve had the pleasure of having multiple such discussions over the last 2-3 years, the roundtable I chaired during the recent NASSCOM India Leadership…