• cloud-banner-2
  • blog-banner-roadmap-1

What a business-centric security model looks like

The traditional concept of having a perimeter to defend is rapidly losing all relevance. Today’s enterprise is effectively ‘borderless’; customers and suppliers transact from anywhere in the...

Continue Reading ››

Tags Digital Transformation, Cloud, Security, BYOD, cloud services, data security, featured, IT security, BYOD policy, Shadow IT

What to Ask Before Signing Up for a Service Desk

There are some important questions that should be asked of providers by organisations considering signing up for a full-equipped Service Desk solution. After all, this is an important decision...

Continue Reading ››

Tags Digital Transformation, BYOD, Gartner, ITIL, Logicalis Servi, Service Desk, Help Desk, IDC, ITSM, Logicalis, Staff turnover

Five Steps to Developing an Effective BYOD Strategy

Consider these startling facts:

Continue Reading ››

Tags Innovation, BYOD, BYOD business case, BYOD user support model, Martin Lindeman, mobility policy, Steps to BYOD, BYOD strategy, Cisco BYOD, mobility strategy, workforce segmentation

What's next for BYOD? From BYOD to xYOD

The trend towards BYOD (bring your own device) was the phrase on everyone’s lips in 2012. Driven by the huge uptake of mobile devices; both smartphones and tablets, ubiquitous wireless access to...

Continue Reading ››

Tags Innovation, BYOD, COPE, Logicalis Virtual Workspace, mobility, VDI, xYOD

1 2 3
»

FOLLOW BLOG VIA EMAIL

Align your business strategies with the business goals