featured posts:
-
Accenture’s Zoran Tackles Digital Identity Failings
May 09, 2019, by Mike SmartNelsonHall recently visited Accenture at its Cyber Fusion Center in Washington D.C. to discuss innovations in its cyber resiliency offerings and the recent launch of its new digital identity tool, Zoran. Failings of existing role-based access (RBA) Typical identity and access management (IAM) systems control users’ access to data based on their role, i.e. position, compe[...]
-
Quick Takeaways from IBM European Analyst & Advisory Exchange (vlog)
Nov 23, 2017, by Mike SmartMike Smart reports directly from IBM’s European Analyst & Advisory Exchange 2017 with some quick take-aways regarding IBM’s transition from systems integrator to services integrator and its business resiliency services.[...]
-
How IT Services Vendors Can Help Organizations Meet GDPR
Nov 09, 2017, by Mike SmartIn this, the second of two articles on GDPR, I look at how IT services vendors can help companies meet GDPR compliance in several areas. You can read the first article, ‘The Impact & Benefits of GDPR for Organizations’, here. Application services Application services can help organizations in ensuring that new and legacy applications meet the GDPR articles perta[...]
-
The Impact & Benefits of GDPR for Organizations
Oct 12, 2017, by Mike SmartIn this, the first of two articles on GDPR, I look at how the regulation is set to impact companies, and at the benefits of compliance beyond simply avoiding penalties. The EU's General Data Protection Regulation (GDPR) was adopted in April 2016 and will be put into force on 25 May 2018. The unified and enforceable laws contained in the regulation replace the o[...]
-
Atos’ Use of Machine Learning for the Prescriptive SOC
Aug 01, 2017, by Mike SmartWhen NelsonHall spoke to Atos earlier in the year about its managed security services, there was a clear push to move clients away from reactive security to a predictive and prescriptive security environment, so not only monitoring the end-to-end security of a client but also performing analytics on how the business and its customers would be affected by threats. Atos’ “S[...]
-
IBM and the Road to Cognitive Security
Jul 18, 2017, by Mike SmartEvery day the sheer amount and complexity of cybersecurity information that security analysts are required to sift through increases. Analysts arrive at the start of each day, catch-up on recent attacks and research cybersecurity news, and are thrown into analyzing security incidents: going down the rabbit hole of reviewing data flows, finding outliers, investigating IPs, searching through both in[...]
-
WannaCry and the Need for IT Spend on Cyber
May 16, 2017, by Mike SmartLast Friday morning, the largest ransomware cyber attack infected an unprecedented number of machines across organizations worldwide. The ransomware named WannaCry demanded $300 in Bitcoins to be paid in three days, otherwise the ransom would double. If no payment was made after seven days, data would be deleted forever. WannaCry ransom message Each time this ran[...]
-
Rio 2016: How Atos is Helping the IOC Redeploy its Budget from Run to Digital
Jul 08, 2016, by Dominique RaviartFour years ago, at the time of the London 2012 Olympics and Paralympic Games, NelsonHall reported on the work Atos does for the International Olympic Committee (IOC) though its Major Events unit. See our previous commentary here. This week we visited its center in Barcelona to get an update on the work it is doing for the Rio Games starting next month, The Olympic Games remain a fantastic o[...]
-
M&A Activity (Part 3): Further Scale and Digital Remain Priorities in 2016
Mar 31, 2016, by Dominique RaviartIn December 2015, we published two blogs about M&A activity in the IT services industry in 2015 (here are the links for Part 1 and Part 2). This blog examines M&A activity in IT services in Q1 2016 and sets our expectations for the rest of this year. In short, 2016 started off with a bang, with two very large IT services acquisitions announced in the first [...]
-
SOC 3.0 and Proactive Security Management: the HP Aspiration
Oct 20, 2014, by Mike SmartNelsonHall recently attended HP’s security analyst day in London. The session provided a deep dive into HP's threat intelligence and the application of this intelligence into its security products line. Concerns about security issues are expanding beyond CSOs/CISOs to the rest of the C suite, even commanding the attention of CEOs. HP highlighted that Conversation[...]
Subscribe here to receive
free blog alerts for this blog:
-
Tech Mahindra’s Application Security Business Expands Offering, Targets Multi-Year Deals
Jul 22, 2016, by Dominique RaviartIn an earlier blog, we described how Tech Mahindra had expanded its performance engineering testing to embrace the Internet of Things (IoT), and here we take a look at how the company is handling another area of non-functional testing: software security testing. Tech Mahindra provides security services through its Cyber Security practice, a horizontal line of business. The practice has a headco[...]
-
The New CSC Targeting Topline Growth Within 3 Years: Is Organic Growth Possible?
Nov 17, 2015, by Dominique RaviartCSC has just laid out the financial targets of the standalone business which will retain the CSC moniker when the U.S federal company, CRSA, breaks off. As well as CSC’s global commercial business, it includes non-U.S. public sector businesses (~$700m revenues in FY15). In its FY15 (ending March 31, 2015) this part of CSC achieved revenues of $8.1bn, and an adjusted operating margin[...]
-
HP Enterprise Services to Strip Out $2bn of Annual Costs in Next Three Years in Pursuit of Margin of 7-9%
May 22, 2015, by Rachael StormonthHP Enterprise Services has announced Q2 FY 2015 results, for the period ending April 30, 2015: Revenue was $4,817m, down 15.5% y/y, and down 10% in constant currency (CC), reflecting key account run off and weakness in EMEA Segment earnings before taxes (EBT) were $194m, a margin of 4.0%, up 143 bps y/y. Q2 FY 2015 revenue by service line (with y/y revenue growth) was: [...]
-
Atos Strategy Update: Bull and Xerox Acquisitions Examined, Indian Offshoring Still Work in Progress
Apr 09, 2015, by Dominique RaviartNelsonHall recently met with the management of Atos to discuss the acquisitions of Bull and Xerox ITO and the progress being made by Atos in adopting Indian offshoring. Note that this meeting took place before Atos' Consulting & Systems Integration analyst day. Bull: Is An Expanded Portfolio Relevant? With its acquisition of Bull, Atos has acquired an IT firm with a significant level[...]
-
Accenture to Acquire Agilex to Enhance Digital Capabilities and Agile Delivery for Federal Sector
Feb 09, 2015, by Rachael StormonthAccenture Federal Services (AFS) is to acquire Agilex Technologies, a privately-held provider of digital solutions for the U.S. federal government based in Chantilly, VA. Terms of the transaction were not disclosed. The acquisition will enhance Accenture’s digital capabilities in analytics, cloud and mobility for federal agencies. It also will add agile delivery expertise. Agilex br[...]
-
ITO Spending Growth Dips Slightly & Bookings Flat in 2014, but Expect Improvement in 2015
Jan 28, 2015, by Dominique RaviartThis week NelsonHall held its quarterly IT outsourcing (ITO) Index webcast. We have conducted these calls for the last six years to monitor developments in ITO from a quantitative perspective. When we introduced the Index, ITO had largely moved from full outsourcing to a selective outsourcing approach, and Indian vendors were deploying their land and expand strategy with the occasional one-off meg[...]