DEBUG: PAGE=domain, TITLE=NelsonHall Blog,ID=1469,TEMPLATE=blog
toggle expanded view
  • NelsonHall Blog

    We publish lots of information and analyst insights on our blogs. Here you can find the aggregated posts across all NelsonHall program blogs and much more.

    explore
  • Events & Webinars

    Keep up to date regarding some of the many upcoming events that NelsonHall participates in and also runs.

    Take the opportunity to join/attend in order to meet and discover live what makes NelsonHall a leading analyst firm in the industry.

    explore

Subscribe to blogs & alerts:

manage email alerts using the form below, in order to be notified via email whenever we publish new content:

Search research content:

Access our analyst expertise:

Only NelsonHall clients who are logged in have access to our analysts and advisors for their expert advice and opinion.

To find out more about how NelsonHall's analysts and sourcing advisors can assist you with your strategy and engagements, please contact our sales department here.

Blog posts under category HGS

go to blog home

Search posts by keywords:

  • 2020 Lessons & Future Success Factors: Q&A with Wipro’s Nagendra P Bandaru

    Jan 22, 2021, by John Willmott

      The following is a discussion between Nagendra (Nag) P Bandaru, President, Wipro Limited – Global Business Lines-iCore, and John Willmott, NelsonHall CEO, covering lessons learned in 2020 and success factors for 2021. Nag is responsible for Infrastructure and Cloud Services, Digital Operations and Platforms, and Risk Services and Enterprise Cybersecurity – three key [...]

  • Infosys Showcases Resiliency of Nearshore Outsourcing Services in Face of Natural Disasters

    Jan 23, 2020, by Sven Lohse

      A magnitude-6.4 earthquake struck Puerto Rico on January 6, killing one person, toppling homes and buildings, and triggering a blackout on the island that is still recovering two years after Hurricane Maria. Governor Wanda Vázquez declared a state of emergency and activated the Puerto Rico National Guard to help with recovery efforts. How might this earthquake disaster have[...]

  • Accenture’s Zoran Tackles Digital Identity Failings

    May 09, 2019, by Mike Smart

      NelsonHall recently visited Accenture at its Cyber Fusion Center in Washington D.C. to discuss innovations in its cyber resiliency offerings and the recent launch of its new digital identity tool, Zoran. Failings of existing role-based access (RBA) Typical identity and access management (IAM) systems control users’ access to data based on their role, i.e. position, compe[...]

  • Atos Makes €4.3bn Unsolicited Offer for Gemalto; Another Bold but Challenging Move

    Dec 13, 2017, by Dominique Raviart

    Atos has made an unsolicited offer for security, SIM cards, and payment cards technology vendor Gemalto. The offer is sizeable at €4.3bn (plus Gemalto’s net debt of €938m at end of H1 2017) financed in cash. It runs until December 15. Gemalto is another major acquisition for Atos: in its fiscal year ended June 30, 2017, Gemalto generated revenues of ~€3bn, with an EBITD[...]

  • Quick Takeaways from IBM European Analyst & Advisory Exchange (vlog)

    Nov 23, 2017, by Mike Smart

      Mike Smart reports directly from IBM’s European Analyst & Advisory Exchange 2017 with some quick take-aways regarding IBM’s transition from systems integrator to services integrator and its business resiliency services.[...]

  • How IT Services Vendors Can Help Organizations Meet GDPR

    Nov 09, 2017, by Mike Smart

      In this, the second of two articles on GDPR, I look at how IT services vendors can help companies meet GDPR compliance in several areas. You can read the first article, ‘The Impact & Benefits of GDPR for Organizations’, here. Application services Application services can help organizations in ensuring that new and legacy applications meet the GDPR articles perta[...]

  • The Impact & Benefits of GDPR for Organizations

    Oct 12, 2017, by Mike Smart

    In this, the first of two articles on GDPR, I look at how the regulation is set to impact companies, and at the benefits of compliance beyond simply avoiding penalties.     The EU's General Data Protection Regulation (GDPR) was adopted in April 2016 and will be put into force on 25 May 2018. The unified and enforceable laws contained in the regulation replace the o[...]

  • Atos’ Use of Machine Learning for the Prescriptive SOC

    Aug 01, 2017, by Mike Smart

      When NelsonHall spoke to Atos earlier in the year about its managed security services, there was a clear push to move clients away from reactive security to a predictive and prescriptive security environment, so not only monitoring the end-to-end security of a client but also performing analytics on how the business and its customers would be affected by threats. Atos’ “S[...]

  • IBM and the Road to Cognitive Security

    Jul 18, 2017, by Mike Smart

    Every day the sheer amount and complexity of cybersecurity information that security analysts are required to sift through increases. Analysts arrive at the start of each day, catch-up on recent attacks and research cybersecurity news, and are thrown into analyzing security incidents: going down the rabbit hole of reviewing data flows, finding outliers, investigating IPs, searching through both in[...]

  • WannaCry and the Need for IT Spend on Cyber

    May 16, 2017, by Mike Smart

    Last Friday morning, the largest ransomware cyber attack infected an unprecedented number of machines across organizations worldwide. The ransomware named WannaCry demanded $300 in Bitcoins to be paid in three days, otherwise the ransom would double. If no payment was made after seven days, data would be deleted forever.   WannaCry ransom message   Each time this ran[...]

  • Unisys Puts Security at the Heart of its Corporate Transformation

    Nov 17, 2016, by NelsonHall Analyst

      Unisys recently held an analyst and advisor day in New York, entitled UnisysNOW. However, with a relatively new leadership team in place and a broad corporate transformation underway, the focus of the event was not so much on the current shape of Unisys’ business but on the company’s aspirations and plans for achieving them, encapsulated in a new tagline: Securing Your To[...]

  • Tech Mahindra’s Application Security Business Expands Offering, Targets Multi-Year Deals

    Jul 22, 2016, by Dominique Raviart

    In an earlier blog, we described how Tech Mahindra had expanded its performance engineering testing to embrace the Internet of Things (IoT), and here we take a look at how the company is handling another area of non-functional testing: software security testing. Tech Mahindra provides security services through its Cyber Security practice, a horizontal line of business. The practice has a headco[...]

  • Rio 2016: How Atos is Helping the IOC Redeploy its Budget from Run to Digital

    Jul 08, 2016, by Dominique Raviart

    Four years ago, at the time of the London 2012 Olympics and Paralympic Games, NelsonHall reported on the work Atos does for the International Olympic Committee (IOC) though its Major Events unit. See our previous commentary here. This week we visited its center in Barcelona to get an update on the work it is doing for the Rio Games starting next month, The Olympic Games remain a fantastic o[...]

  • The New CSC Targeting Topline Growth Within 3 Years: Is Organic Growth Possible?

    Nov 17, 2015, by Dominique Raviart

    CSC has just laid out the financial targets of the standalone business which will retain the CSC moniker when the U.S federal company, CRSA, breaks off.  As well as CSC’s global commercial business, it includes non-U.S. public sector businesses (~$700m revenues in FY15). In its FY15 (ending March 31, 2015) this part of CSC achieved revenues of $8.1bn, and an adjusted operating margin[...]

  • The Rise of Managed Security Services: A $15bn Market by 2019

    Oct 20, 2015, by Mike Smart

    IT security has never been more important, with levels of cybercrime continuing to climb and the adoption of cloud, mobile and IoT technologies increasing organizations’ ‘attack surface area’.  With organizations gathering more data than ever via digitization and big data, and attackers finding ever more sophisticated ways of targeting them, both the depth and breadth of att[...]

close