Tags
- Cloud 91
- Public Sector 37
- Security 34
- Data centres 32
- Managed Services 24
- business continuity 19
- G-Cloud 17
- outage 14
- Data Protection 12
- VoIP 12
- Data Security 12
- BYOD 12
- Remote Working 11
- Unified Communications 11
- disaster recovery 10
- Data Storage 10
- Cloud Services 10
- Government 10
- Mobile 9
- resilience 8
- Hybrid Cloud 8
- Legal 8
- Healthcare 8
- IP Telephony 7
- ADSL 7
- downtime 6
- Wi-FI 6
- Internet 6
- Telephony 6
- NHS 6
- N3 6
- Data Backup 5
- Cloud Computing 5
- IaaS 5
- Public Cloud 5
- internet of things 5
- DBaaS 5
- efficiency 5
- MDM 5
- Service Provider 4
- Oracle 4
- Infrastructure 4
- Data Centres 4
- MPLS 4
- Malware 4
- Cloud Telephony 4
- BlackBerry 4
- 4G 4
- Data Protection Act 3
- SLA 3
- Private Cloud 3
- SaaS 3
- Google 3
- Public Sector Network 3
- Symposium 3
- Network 3
- HSCN 3
- technology 3
- Regulations 3
- Apple 3
- SIP trunking 3
- Online Backup 2
- SQL Server 2
- databases 2
- BT 2
- PAYG 2
- VDI 2
- Amazon 2
- Mainframe 2
- Desk Top Sharing 2
- Migration 2
- IT Management 2
- Database as a Service 2
- Cloud Strategy 2
- data sovereignty 2
- ICT 2
- Insurance 2
- Software 2
- Applications 2
- Data 2
- PSN 2
- Wireless 2
- Retail 2
- Data Centre Provider 2
- Connectivity 2
- GDPR 2
- Ofcom 2
- EFM 2
- QoS 2
- ISDN 2
- CYOD 2
- MVNO 2
- Enterprise 2
- Mobile Strategy 2
- mobile data 2
- Firewall 2
- network 2
- SD-WAN 2
- Outage 1
- Online Storage 1
- Support 1
- Unreliability 1
- Availability 1
- DDoS Attacks 1
- IT Provisioning 1
- business agility 1
- Contingency 1
- Federated Clouds 1
- Cloud to Cloud 1
- Salesforce.com 1
- Gartner 1
- virtualisation 1
- US Patriot Act 1
- cloud 1
- Platforms 1
- Blogging 1
- Data Sharing 1
- OCS 1
- Productivity 1
- Video Conferencing 1
- fog computing 1
- Services 1
- Virtual Desktop 1
- Hosted Desktop 1
- SIAM 1
- CCS 1
- Crown Commercial Services 1
- Cloud Provider 1
- Government as a Platform 1
- shadow IT 1
- Ransomware 1
- Digital Economy Centres 1
- IT 1
- HETT 1
- CGBT 1
- Journey to the Cloud 1
- Journey To The Cloud 1
- IT Services 1
- Microsoft Office 1
- Azure 1
- Digital Strategy 1
- Digital Marketplace 1
- AWS 1
- VMWare 1
- OpenStack 1
- Public Wi-Fi 1
- Legal Sector 1
- data security 1
- hybrid cloud 1
- SMEs 1
- Brexit 1
- Privacy 1
- security 1
- innovation 1
- insurance 1
- DevOps 1
- retail 1
- IT infrastructure 1
- HSCN Connectivity 1
- Cloud Transformation Process 1
- Citrix on Azure 1
- next generation on vdi solution 1
- Prism 1
- PUE 1
- Cold aisle containment 1
- Cooling 1
- Power 1
- hosting 1
- power 1
- JANET 1
- data controllers 1
- General Data Protection Regulation 1
- Microsoft 1
- SAP 1
- Hosting 1
- BIL 1
- Freedom of Information Act 1
- Personal Data 1
- Bandwidth 1
- Social Media 1
- Streaming 1
- Email 1
- Messaging 1
- Contention Rates 1
- SDSL 1
- 512k bug 1
- password 1
- Moore’s Law 1
- wearables 1
- microchip 1
- Intel 1
- security threats 1
- WannaCry ransomware attack 1
- Collaboration 1
- Home Working 1
- playback service 1
- call recording platform 1
- call recording service 1
- MYOD 1
- BES10 1
- Consumer 1
- Blackphone 1
- iPhone 6 1
- iCloud 1
- iOS 8 1
- Samsung 1
- Networks 1
- Network Operators 1
- Coverage 1
- call rates 1
- HSCIC 1
- VPLS 1
- Two-Factor Authentification 1
- FTTP 1
- Cambridge 1
- Metro Network 1
- IPv6 1
- Network design 1
- Network Planning 1
- ISDN30 1
- N3 Aggregator 1
- Network Security 1
- Unified Threat Management 1
- Convergance 1
- Shadow IT 1
- Software Defined Networks 1
- SDN 1
- Virtualisation 1
- Wi-Fi 1
- #GenMobile 1
- LAN 1
- Compliance 1
- ITIL 1
- Customer Service 1
Latest Posts
- Having a different conversation about SD-WAN 23 May 2018, 14:02 PM
- Cloud Workspace ‘a powerful combination’ 3 May 2018, 11:17 AM
- Orchestrating Cloud transformation 17 Apr 2018, 09:38 AM
- Why SD-WAN is good business 9 Apr 2018, 14:02 PM
- A robust security-first culture will tackle any security threat 6 Mar 2018, 17:24 PM
Latest Comments
Authors
- Stefan Haase
- Tim Wilkinson
- Paul Hone
- Ian Rhodes
- Louis Ozougwu – MCITP - OCP - Oracle RAC
- Jonathan Birch
- Sean Paxton
- Glenn Temple
- Mark Hall
- Simon Michie
- James Odom
- Peter Nailer
- Fraser Fisher
- John Roberts
- Phil Dyson
- Graham Francis
- Andy Mills
- Mark Halpin
- Chris Bull
- Vaughan Andrews
- Martin Fisher
- Francis White
- Stuart Brown
- Phil Moore
- Anton Murphy
- Damon Crawford
- Wesley Hornsey
- Louis Ozougwu
- Chris Mcmahon
- John Taylor
- Paul Storey
- Richard Allgate
- Richard Allgate, Mobile Specialist
- Mark Hall, Public Sector Director
- Clive Atkins
- Stephen Rees
- Andrew Nicholl
Blog
Blurred lines – who owns the data on your mobile phone?
Posted by Richard Allgate | 20 Oct 2014, 15:37 PM

Redcentric’s mobile specialist, Richard Allgate, looks at the ownership of data on a mobile device in a BYOD scenario and an example on how personal data on a mobile device could be wiped in a MDM situation. Richard looks at how to plan for such scenarios within a corporate BYOD policy and solutions to ensure that business and personal data are ring fenced.
read moreIs corporate mobile security the new black?
Posted by Richard Allgate | 14 Aug 2014, 16:23 PM

Redcentric’s mobile specialist, Richard Allgate, gives his thoughts on the recently launched Blackphone and its impact on the business world marketplace. With BYOD becoming an increasing topic within IT departments Richard discusses if security should be centered on the device, the endpoint and its user or on the linked corporate network.
read moreMDM madness
Posted by Richard Allgate | 7 Jul 2014, 11:55 AM

As mobile device management (MDM) solutions increase within the market place, Richard Allgate takes a look at the current offerings by providers and how he sees Cloud impacting MDM.
read moreThe future of BlackBerry – Mobile Device Management?
Posted by Richard Allgate | 16 Aug 2013, 13:34 PM

Richard Allgate, Mobile Specialist at Redcentric, speculates on the future of BlackBerry amid revelations this week that the company is considering ‘strategic alternatives.’ Reflecting on the success of its Mobile Device Management platform, Richard nods to this offering as BlackBerry’s saving grace, noting its ability to improve the security of business mobile offerings.
read moreBring Your Own Device
Posted by Richard Allgate | 8 Aug 2012, 16:58 PM

BYOD or Bring Your Own Device is the latest trending term in the marketplace but can cause IT managers untold headaches. This blog looks at some of the obstacles faced by IT managers when dealing with this new technology.
read more- First
- «
- 1
- »
- Last