• Email: support@itsoncomputer.co.uk
  • Free shipment on all orders
  • sales@itsoncomputer.co.uk
    +44-20-8157-0699

PRODUCT CATALOGUE
Network Access Control | You can't live without it

We work with more and more devices, all of which connect to a network. Ease of use and accessibility during work are central to this. That is of course ideal, but it is also a security risk and you put an increasing burden on your network. That is why it is important that you keep a grip on the accessibility of your network. Do you know exactly who is connected to your network where, when and in what way? The answer is probably no. Below we explain why you really can no longer do without Network Access Control.

The ecosystem in which devices such as laptops, smartphones and IP cameras exchange data is a real candy store for hackers. That is why it is smart to subject your devices to a thorough check the moment they want to connect to your network. Because the quality of hackers and cyber attacks is growing just as fast as IT security itself. 

You don't just let everyone in at home, do you? 

Just like you don't let everyone in at home, you don't want everyone to just connect to your network. Where you normally build a physical barrier, you do that virtually with your network. Because you simply cannot make well-founded decisions if you do not know who is connecting to your network. That is why it is smart to subject your devices to a thorough check the moment they want to connect to your network. You do this with Network Access Control (NAC).

What is Network Access Control? 

Network Access Control allows you to link different security technologies. This way you ensure a centralized approach to your network access, whether you have a wired or wireless network. For example, you can use NAC to restrict network access for allowed users. But also to ensure that all devices that connect to your network meet certain requirements. Think of checks whether the latest anti-virus software is installed and whether there are known vulnerabilities. With NAC you define the policy of your organization centrally. This means that a user always gets the desired level of access, regardless of where or when they connect to your network. After a number of security checks, your system automatically determines whether it grants access to your network.

How does Network Access Control work? 

But how exactly does that work? With NAC, you can secure your network before someone enters the network. During this pre-admission phase you perform an access control. You decide which access rules you use for which users and which segments. This is the foundation of your access policy against which every connection is tested. Below you can see which steps NAC goes through:

1. Do you know the user and his device? 

Allowed users can log in to your network. Is it an unknown user? Then you have to determine whether that person is allowed access and with what permissions. But you also record which rights and access they have for authorized users. This can differ, for example, with a private device compared to a business device.

2.Is the device safe?

Before someone connects to your network, check the security of the device. Is the operating system configuration up to date? Is a firewall and antivirus installed? Do you detect malware or ransomware? When in doubt, place the device in quarantine.

3.What rights does the user or device have?

You have recorded in your NAC policies which rules your system uses to decide which rights a user or a device has. Based on this, the user or device gains access to certain segments of your network.

4. Are there threats lurking?

Once connected to the corporate network, your firewall can communicate with your NAC solution to indicate that a device or user is not secure and should no longer access the network. NAC then ensures that the connection is actively broken if desired. This way, your network remains protected, even after devices have connected.

Where do you implement NAC? 

NAC is indispensable for any institution or company where a large number of users from different locations and with multiple devices connect to the company network. Below are a few examples:

  • Educational institution 

Educational institutions typically have a user base that changes periodically. But staff and teachers also connect to the network with multiple devices from multiple locations. University campuses are often seen as an IT specialist's worst nightmare. Network access control solutions give IT administrators the ability to create policies that determine who can access which parts of the network. NAC solutions can also provide access to the control site and determine how many devices a user can connect to the network or what types of devices are allowed to do so.

  • healthcare

Another example of network access control implementation is healthcare. Especially here, NAC solutions face many security challenges. Think of the increasing number of medical devices that connect to the network, external partners that communicate with each other and the enormous amount of personal and medical data that is exchanged. With NAC, you can easily improve overall security in compliance with applicable laws and regulations. NAC enables healthcare personnel to quickly and easily access patient information, while limiting that information only to designated personnel.

  • Commercial organization?

There are a number of ways in which NAC can also benefit your organization. For example, when implementing a new access policy or providing security analytics that apply machine learning and perform security analytics to identify security risks. Ultimately, a NAC solution must provide insight and ease of management.

Management and insight with NAC

Only when you have insight into who is connected to your network, when and in what way, you can make well-founded choices about the management of your network. How many users are on my network? And with which devices? How much traffic is there on my network? By means of weekly or monthly reports you know exactly what the status of your network is. This way you know what to focus on and where your priorities lie. In addition to better insight into your network performance and network security, you also maximize the efficiency of your network. And with that you ultimately even reduce your IT costs. In other words: you can no longer do without Network Access Control!

Knowing more? Then read our infographic about Network Access Control or our e-book about network management.

Implementing AI in your data center

The digital transformation is rapidly accelerating. More and more organizations are developing data-driven business models to maximize the use of their data. Data is gold and has become an important part of almost every business operation. Almost every organization has therefore started implementing a smart data center.

Running data centers and hiring cyber professionals is hugely expensive. Organizations are therefore constantly looking for better options. Artificial Intelligence is a strong alternative for this. For example, the data center is used to autonomously perform various tasks such as server optimization and equipment monitoring. It is clear that AI helps your company to stay ahead. But what are the concrete benefits?

Make your data center more secure

Data centers are susceptible to various types of cyber threats. Cyber criminals are constantly finding new ways to get data out of our data centers. Using sophisticated malware, they plan cyber attacks that infiltrate organizations' networks. The consequence? Access confidential data from millions of users.

Many organizations therefore employ cybersecurity professionals to analyze and prevent new cyber attacks. However, finding and analyzing cyber attacks is extremely labor-intensive and expensive.

With the help of AI you can use your data center to protect your data. It learns network behavior and detects cyber threats based on deviations. In addition, it identifies malware and security vulnerabilities in your data center system. Incoming and outgoing data are screened for security threats. This way your organization remains extra safe.

Monitor your equipment with AI

Many companies often experience sudden repairs or equipment failures. Mechanics do not always detect defects in the system, which in turn can lead to malfunctions. The result? An expensive repair or even the replacement of equipment. In addition to this cost, equipment downtime also causes lower productivity and poor customer service.

Equipment outages are a common phenomenon for data centers, usually due to the increasing amount of data processing. The entire system is heated, constantly affecting data center equipment. The cooling system has stopped working due to an undetected error? Then the whole system overheats. Monitoring equipment is therefore of great importance.

Do you want proactive monitoring of your equipment? Then use AI. AI detects defects in equipment through pattern-based learning. If AI systems find too much or too little vibration and unwanted noise, the system alerts data center engineers to possible defects. In this way, AI prevents possible malfunctions in the data center and you ensure that your organization never comes to a standstill.

Experience less downtime in your organization

Data center outages often lead to significant downtime. Until now, many organizations therefore hired professionals to monitor and predict data outages. But with the implementation of AI you save a lot of unnecessary effort and costs. AI monitors and predicts server performance, network congestion, and disk usage to avoid downtime. Based on these results, an AI system can autonomously implement mitigation strategies to help the data center recover from data outages.

Optimize your servers

Each data center consists of multiple physical servers and storage devices. This is where the processing and storage of data takes place. To process large amounts of data, engineers design algorithms in their data centers. Based on that, the servers divide the workload equally. But with the increasing growth of data, this approach is no longer sufficient for optimal server performance.

With AI, you distribute this workload across different servers using predictive analytics. The system, based on so-called load balancing algorithms, learns from past data. This way you can remedy possible errors in the data center, shorten processing time and quickly resolve risk factors. That way you get the best out of your server.

In short, AI has significant benefits. Would you like to know more about the use of Artificial Intelligence or Machine Learning in your data center? Please feel free to contact one of our specialists.

Is your data center ready for the future? Find out in our eBook.

Five Common Wi-Fi Errors

The market is changing and new trends are constantly being discussed: Internet of Things (IoT), Artificial Intelligence, sustainability, security. The list is long. But what impact do these trends have on your wireless network? 

The larger your environment is, the more likely you are to encounter any sources of interference. The basis of a wireless network is extremely important. A mistake in the design, in the purchase of the right equipment or in the security and setup of the network is quickly made and costs a lot of money. We list the five most common mistakes below for you, so that you don't have to make them again. 

Five mistakes when purchasing a wireless network: 

1. No Wireless Site Survey

A site survey examines whether your wireless network is functioning optimally. This allows you to measure, among other things, the presence of signals from the immediate environment. By excluding any possible interference in advance, problems such as poor network performance can be avoided. Yet in many cases such a survey is skipped. And you better not do that. 

But how does that actually work, such a Wireless Site Survey? With professional software, floor plans of the intended environment are loaded, after which a physical measurement is made on location with measuring equipment. Especially in locations with a lot of steel and thick walls, or within environments where latency sensitive applications are used. So you can prevent many problems with it: incorrect placement of your access points, an insufficient coverage area or a weak signal strength. So don't skip this check.

2. The wrong design

In addition to a Wireless Site Survey, it is important to draw up a good design. This is done on the basis of various factors: the desired network capacity, the type of devices/users, application of critical applications, network security and scalability. The system is installed and programmed on the basis of design. If you do not include these factors in the design phase of the network, you create an incapable WiFi network and therefore insufficient performance, scalability and continuity. A shame, at least you always want to be able to grow with the future.

3. Poor or no monitoring and management solution

A professional WiFi solution is not a solution that is implemented and then runs without management. In addition to a correct design, correct implementation and configuration, monitoring and tuning is just as important. With a modern monitoring package you make mistakes transparent and you can tackle them more easily. But what mistakes? Latency issues, DNS issues, DHCP failures and coverage issues are just a few examples. By gaining graphical insight into the current status of the environment and historical reports, many problems are prevented or solved.

4. Minimal Network Security

Due to the increasing flow of mobile devices and IoT, the number of visitors on your network is increasing. All the more important to pay extra attention to how you organize access to the wireless and wired network. As a network administrator, it is important to have insight into who, where, when and with which device has access to the network. Automatic authentication and assigning the correct policy to devices and users are part of a secure network security policy.

By applying this, users and devices are identified before they can access a certain part of the network. This not only provides an increased security level, but also reduces the management burden on the network. Are you not doing this? Then you run the extra risk of uninvited guests on your network.

5. Insufficient scalability

The degree of mobility is increasing and therefore more people are using mobile devices. Their demand? Lightning fast and stable WiFi. Devices, applications, new systems: we demand more and more from our network. Is it reliable enough to guarantee continuous availability? Is it secure enough to protect confidential data? And above all, is it scalable enough to facilitate rapid growth? 

Many organizations are looking for a network solution that grows with you. Adding extra access points to your network: it should be easy and fast. It is important to respond quickly to the needs of your organization. Scalability is therefore the key to a future-proof network. Is your network not scalable? Then you run a great chance of falling behind in your organization and competitive market.

Wifi as a Service: constantly growing with you

Due to the increased dependency, complexity and cost savings, many organizations choose to outsource the management of the wireless network: Wireless as a Service (WAAS). This way you have predictable costs per month, 24/7 monitoring and you can easily grow with the organization. With WAAS, your wireless network is always up-to-date, secure and modern.  

SD-WAN: All your locations securely connected

Able to respond quickly to changes. That's what you expect from your network. You don't know what the future will bring, but you do want to be able to respond to it and not fall behind. That is why it is important that your network is as flexible as you are. Is SD-WAN an option then?

All these changes affect the requirements you place on your network environment. Usually you want more and more. More traffic, more bandwidth, more analytics and, above all, more SAAS applications. You then quickly tend to deploy more and more capacity, in terms of hardware and FTEs. But is that always the solution? What you really need is a network that moves with you and enables your organization to be agile. And all this without jeopardizing your performance or costing you.

The Limitations of MPLS and Traditional WAN 

A traditional network is no longer good enough: MPLS connectivity is expensive, rigid and no longer suited to a modern business environment. A WAN is built to connect and secure static and physical locations, but it is not designed for mobile employees who use cloud services. Cloud-based applications increase your traffic and require low latency to function properly.

A WAN typically requires backhauling all your traffic, including that to the cloud. This means that all traffic is first routed from your branches to the data center of your head office for the necessary security checks. The delay this causes degrades the application's performance, resulting in a poorer user experience and productivity loss. That means you need an architecture that enables internet breakouts per location for direct access to cloud services.

SD-WAN: flexible, cost effective and easy management 

SD-WAN stands for Software-Defined Wide Area Network. As the name might suggest, this is an approach based on software defined networking (SDN) technology applied to WAN connections. This makes it easier to connect different locations via your network. In addition, it is cost effective and SD-WAN simplifies the management of your network.

Unlike traditional WAN architecture, the SD-WAN model is designed to support applications hosted in local data centers, private or public clouds, and SaaS solutions. It also ensures that the performance of your applications remains high. How is that possible? By using and combining multiple active load-sharing connections of any type (broadband/cable, MPLS, 3G/4G). Advanced data caching, traffic compression, and other WAN optimization capabilities maximize available bandwidth. SD-WAN automatically makes dynamic adjustments to your quality of service and application policies, so you always have enough bandwidth for your applications. For example, you can send Citrix traffic that must always be given priority over line 1 due to latency,

Keep it safe with Secure SD-WAN 

But how secure is SD-WAN? It does have its shortcomings when it comes to security with instant internet access. A secure SD-WAN is a good solution for this. So if you choose SD-WAN, go for Secure SD-WAN. You support SD-WAN with a Next-Generation Firewall. That way you add intrusion prevention, application control and anti-malware to your traditional firewall-VPN combination. In addition, you only have one platform for end-to-end security throughout your network, so you can easily keep an overview. This way your network performs optimally and you have the very best protection against cyber attacks.

Are you ready for SD-WAN? 

How do you know if SD-WAN is for you? If your employees increasingly work with cloud services from different locations, you can no longer do without. SD-WAN increases the reliability, agility and performance of your network. In addition, your operational costs are also reduced. What are you actually waiting for? We summarize the advantages below.

Benefits SD-WAN

  • More speed and flexibility
  • Uptime improvement
  • More insight into traffic
  • Lower operating costs
  • More efficient use of bandwidth
  • No backhaul internet traffic
  • QoS per application (only with Secure SD-WAN)
  • Easy to link with cloud services
  • Integrated central management & performance monitoring

Are you ready to upgrade your network to the future?

Download the e-book Manage network: Maintain control over your company network and the Security Wheel e-book: good Cyber Security in 12 steps .

5G vs. Wi-Fi 6 | Network of the future

5G vs. wifi 6: what is it and what are the differences? The 5G network has recently become available, and everyone is talking about it. Could this be the network of the future? In practice, 5G has a much lesser-known but formidable competitor to Wi-Fi 6. This new standard has the potential to have a major impact on the most widely used forms of wireless connection in the short term. But what are the advantages of both networks and what is the difference between the two? We explain it below.

What are the benefits of 5G?

As a successor to 4G, 5G is the fifth generation of mobile telecommunications. The main differences between the two are that with 5G a much faster data transfer is possible, the response time is shorter and connections are more stable. 5G not only accommodates the increasing demand for mobile data, but also enables a range of new applications. Think, for example, of self-driving cars or live streams between doctors and ambulances.

Faster internet with WiFi 6

Just like with 3G, 4G and 5G, there are different levels with Wi-Fi 6. With each update a number is added. After WiFi 4 and WiFi 5, we are now at WiFi 6. This increases the speed of the connection and allows many more devices to achieve high speeds at the same time. This new standard is no less than thirty to forty percent faster than WiFi 5. The chips that process the data are becoming increasingly powerful, so that more data can be sent over the network within the same radio waves. But an additional advantage is that Wi-Fi 6 can also convert a wireless channel into different sub-channels. Each subchannel can carry data for a different device.

Is your WiFi network properly secured? Discover it in our Security Wheel and check the twelve steps to optimal IT security .

5G vs. Wi-Fi 6

While 5G is a network that is used very widely, WiFi 6 mainly has to rely on smaller environments. However, the 5G masts can be found everywhere and no login is required. But because Wi-Fi is easy to scale, the costs are lower than with 5G. That is why we expect that companies will eventually opt for WiFi 6 more quickly than for 5G. However, the situation is different if you travel a lot for work: in addition to the possibility to have access to the internet in different places, mobile workers with 5G can also easily connect new devices. No bluetooth or router is needed anymore. Because 5G is super fast, you will not experience any hindrance from other devices that are connected. In addition, 5G consumes little energy without sacrificing speed.

We can summarize the differences as follows:

  • Wifi 6 is especially useful for offices and home workplaces
  • Wifi 6 is relatively cheap due to scalability and efficiency
  • 5G is more widely available and more user-friendly
  • 5G saves energy without sacrificing speed

The best of both worlds

Actually, the question is not which of the two options is better. Ideally, 5G and WiFi 6 would work together perfectly, so that you always have the best connection. Soon we will all be connected to both networks and our lives will look different. We are moving towards a connected world, in which all devices are connected to each other and use each other's data. Whether the choice falls on 5G or WiFi 6 depends entirely on the device, the situation and the use. It is not a question of 5G or WiFi 6 as a total solution, but of the need at the time. In general, Wi-Fi 6 is ideal for the office and home workers, where 5G is the perfect solution for on the go. Both techniques are lightning fast, complement each other well and bring with them many new possibilities.

Optimally secure your infrastructure. Where do you start?

A hot topic for most IT Managers: security. Every day there are reports in the news about organizations that have been victims of cybercrime. Optimally secure your infrastructure: everyone knows how important it is. Yet companies are still insufficiently protected against attacks from both inside and outside. Securing a complex corporate network is a chore, because it is constantly put to the test. So it's an important topic. But how do you make it concrete and find out what you need to invest in to further expand your security? The steps below will take you a long way.

1. Segment your network 

Take control of the traffic between your network groups. Your network consists of virtual network zones, called VLANs. By implementing a separate policy per VLAN, you apply segments that each have their own virtual firewall. This allows you to tailor the security of your infrastructure, because you can segment how you want: based on user, device or target group. This way you create optimal security in the core of your network. But why is network segmentation really so important?

Without network segmentation, all devices present within your company can communicate with each other. This means that viruses can easily spread from one device to another. With the help of network segmentation you ensure that a possible infection is limited and you block all traffic between your network groups using various virtual firewalls.

2. Use an Endpoint Protection Platform

Unsecured laptops, fixed workstations or servers: this is where things often go wrong. Malware enters your company or important data is stolen. How can you best prevent this now? An Endpoint Protection Platform (EPP) is the answer.

You probably have a good firewall and antivirus software by now. Top! But that does not protect you against a so-called 'zero day attack'. This is a cyber attack that takes place on the day a software vulnerability is discovered. This is usually before the software developer makes a solution available. You are therefore not fully protected during this period. This is where EPP adds value.

This allows you to analyze the behavior of your endpoints using smart algorithms. The behavior of all applications is constantly studied and assessed for suspicious activity. This not only detects known malware, but also unknown threats are immediately blocked and quarantined. Are you not using EPP yet? A shame, because that can cost you an unnecessary amount of time and money.

3. Use your employees as a line of defense 

You can still take so many measures within your organization, it can still go wrong due to human error. Viruses or other external threats often inadvertently enter through employees. With security awareness you make your employees aware of their digital behavior and you test their skills.

But how does that work? Using various simulations, it is possible to assess the sensitivity of users to, for example, phishing attacks. This way you know who needs help, when and in what way to avoid external danger. Arming your employees against cyber-attacks with personalized training can save your organization a huge amount of money. This limits damage within your organization.

Get off to a flying start with these 3 steps. But do you really want to make your network environment 99.9% waterproof? Then read all 12 steps of our Security Wheel in our e-book.

 

RIDE THE REMOTE REVOLUTION TO FUTURE-PROOF YOUR BUSINESS

New Lenovo™ study shows how you need to forget the office you once knew

  • 70 percent of global employees surveyed report higher job satisfaction and 56 percent feel more productive at home
  • Employees prefer the flexibility of working remotely, with 88 percent of participants from large companies wanting to work from home (WFH) or work from anywhere (WFA) at least some of the time
  • Management agrees with these benefits, as 83 percent of IT decision-makers (ITDMs) from businesses surveyed expect post-pandemic work to be remote at least half the time
  • Data security ranks as the #1 most time-consuming challenge among IT departments, study shows, with ITDMs feeling more prepared to deal with another pandemic than security threats
  • The majority of businesses (63 percent) surveyed are interested in Device-as-a-Service (DaaS) offerings because they free up valuable time and resources for more strategic projects

Research Triangle, NC, March 22, 2021 – One year after the global remote work revolution, the shift to work from home (WFH) and work from anywhere (WFA) is already resulting in profound effects on businesses’ digital transformation as well as data security concerns. According to Lenovo’s new Future of Work and Digital Transformation study, a vast majority of businesses (83 percent) expect to work remote at least half the time, whereas 60 percent of employees not only agree but are happy to do so. These new findings are part of a global survey of more than 8,000 employees and IT decision-makers (ITDMs) across 14 markets from companies of all sizes on the impact of remote work, including job satisfaction, technology challenges and solutions conducted in early 2021.

Among the key insights is that workers have hit their stride navigating their new WFH lives. Most employees (83 percent) want a hybrid work model post-COVID, which businesses say are more than happy to accommodate because they know it’s a way to drive employee engagement and attract new talent. Enabling remote work has meant a change in digital adoption, with an increased usage of personal devices for work; wider adoption of collaboration cloud and software; and a heightened focus on data security among IT functions across businesses of all sizes. The study also shows that trusted technology providers will need to play a key role in developing future digital strategies, while Device-as-a-Service (DaaS) is gaining traction among larger businesses to make it easier to provide employees with up-to-date technology devices and as a way to free up precious resources for more strategic priorities.

“With businesses and their employees both optimistic about a future in hybrid work and remote collaboration, today’s IT departments are faced with the rising resource costs of data security and compliance,” said Gianfranco Lanci, President and Chief Operating Officer, Lenovo. “More than ever, businesses need reliable technology partners to fully manage their hardware, software and services to maximize value and boost security.”


 
EMPLOYEES OVERCOME REMOTE WORK BURNOUT AND START EMBRACING HYBRID WORK

Contrary to initial concerns that remote work would lead to a rise in employee burnout within the first year of the pandemic, the Lenovo study showed that most workers have adapted remarkably well to WFH and WFA – 70 percent say that the flexibility leaves them more satisfied with their job overall. About 60 percent of surveyed employees now prefer remote work at least half the time, while over one-third want to WFH/WFA most or all of the time. This sentiment increases among workers in larger companies, with approximately two-thirds of those respondents in large companies preferring to work remote at least half the time. It’s not unusual, particularly in large organizations, to be working with teams across continents and time zones, which make the physical location of an office less relevant for effective collaboration.

Employees nevertheless cite a number of challenges. Chief among them are slow or unstable Internet connections at home. Additionally, about half the employees in medium-sized businesses (50 percent) and small or very small businesses (42 percent) report delays or challenges in getting any kind of IT support when needed. Businesses may want to consider always-connected PCs with integrated LTE or 5G as a way to offer employees freedom from reliance on the home Wi-Fi network alone and to provide higher security. Smarter devices, services and software solutions that can self-diagnose and pre-empt IT issues can also help small businesses that don’t typically have a robust IT support team.

With 90 percent of workers surveyed still wanting the option to go into the office to connect with colleagues and 56 percent saying they are more productive at home, it’s clear that the role of the office will be changing. The office is no longer the place where work gets done; it’s evolving into a place where one can connect and collaborate while leaving deep work for focused time at home.


 THE BLURRING LINES OF WORKERS’ PERSONAL AND PROFESSIONAL DIGITAL DEVICES SHOW HOW WE WORK

Remote work has also led to a new suite of digital hardware, software and services solutions. One’s collection of devices and technology for work has become increasingly personal and collaborative. Employees are increasingly leaning into the use of their personal devices such as laptops, smartphones and tablets for work, with 79 percent of employee respondents saying they’re now using their smartphones for work-related tasks such as voice and video calls, email and work chat. When it comes to PCs, technologies such as AI-based noise cancellation during calls, webcam privacy shutter for when the camera’s not in use, eye care for displays’ natural low blue light and better device cooling all rank as the top smart device features across employees of all business sizes. However, workers aren’t taking enough advantage of company programs to finance their technology purchases. While 80 percent of IT departments reported they are willing to cover purchases of work-related equipment, sometimes as little as 22 percent of employees have used these policies.

Unsurprisingly, collaboration cloud and software tools for needs like videocalls and simultaneous document collaboration are now essential for a whopping 97 percent of employees. Almost two-thirds of respondents also say that these tools help improve productivity and efficiency.

INNOVATION FIRST, SECURITY ALWAYS – THERE’S NO DIGITAL TRANSFORMATION WITHOUT DIGITAL SECURITY AND SERVICES

With the increasing use of remotely-connected cloud and collaboration tools – where even smart home devices may increase risk to company data as employees log on from home – data security has understandably jumped to the forefront of IT considerations and is now the number one priority for digital transformation. This concern is putting a growing strain on IT department resources. ITDMs feel more prepared for another pandemic than against data threats. Data security and compliance are now siphoning the most time and money from IT functions, while most large and medium-sized companies already subscribe to an IT security service.

Businesses of all sizes will need to grapple with how best to keep themselves secured with the integration of partner security services, and commit to a more agile business-centric approach to security that also focuses on the cloud and data. Against these growing concerns, almost all businesses report having some sort of continuity plan in place, such as cloud-based data backup (45 percent), physical data backup (39 percent) and data security training (39 percent).

With the rise of the subscription culture, ITDM respondents – particularly from medium and large businesses – also expressed growing interest in DaaS solutions which can keep hardware up to date, scale technology needs over time, and even free up time and resources for more strategic projects. With a tenth of businesses currently subscribing to a DaaS-like service, almost two-thirds (63 percent) are showing more interest – pointing to an increased crossover of the ‘everything-as-a-service’ (EaaS) trend from the consumer into the commercial realm. Expect the EaaS model to also expand and expedite IT deployments into turnkey solutions – shortening timeframes from months to days.

Access the full study directly and download the image set in the press kit.

About Lenovo’s Future of Work and Transformation Study

Fieldwork for this study was conducted via a quantitative survey from January 15 to February 11, 2021, on a total of 8,533 global respondents. The survey sample comprised of a near equal number of respondents from each market: Australia, Brazil, China, France, Germany, India, Indonesia, Italy Japan, Mexico, Russia, Singapore, the United Kingdom and the United States. Respondents included business end-users currently working from home who worked in the office prior to the pandemic and IT decision-makers whose companies have made policy or work location changes due to the pandemic from March 2020 onwards.

THE FUTURE OF WORK

The future of work is inextricably linked to the evolution of the workplace, an evolution that has been accelerated during the global pandemic. We have seen and personally experienced the challenges that necessitates this evolution. From being unable to find what we needed in stores, or secure a home delivery slot, to being unable to contact a service provider due to increased demand. It was clear that many services, tied to the way people work were not up to the challenge.

We had already witnessed the workplace moving towards automation, artificial intelligence and machine learning, along with a general digitalisation of processes, to both streamline and create new services for business.

With the displacement of people from offices, and the frustrations of individuals being unable to access services, it highlighted just how far many organisations had fallen behind. The future workplace must account for how services are consumed to ensure great customer experience and keep businesses relevant and functioning regardless of external pressures.

Where we work

The digitalisation of the workplace and the transformation of work will manifest in hybrid ways of working. Having the capability to work from any location will also impact the place of work as well. Organisations will need to think about what the workplace will be used for and why people would return. Some organisations are looking to reduce their physical office space or move out of major cities. Office workers might require more specialised collaboration facilities that are inclusive of people wherever they might be. Front line workers may require access to new technologies or information to help support new business initiatives.

Skilled for Work

Employees will have to re-skill or retrain as technology augments their role and potentially impacts where the tasks are performed. Digital competency is a valuable skill that all must embrace. Much of the effectiveness of work is dependent upon understanding both what, and how technology should be used to be effective in the workplace. Artificial intelligence, machine learning, and personal assistants will make people far more productive. Scheduling meetings, booking appointments and time management are obvious benefits, allowing people to focus on the important things in their day, rather than being tied up in administrative tasks.

Fit for Work

One area of focus, that arguably has previously been hidden from view, is employee health and wellbeing. Employee welfare is an integral part of any workplace strategy. Supporting employees to be their best selves allows for more productivity, creativity, builds trust and employee and by extension customer satisfaction.   

Over the past year, work, for everyone has changed, probably forever. Whether a scientist, a nurse, a teacher or a social worker, we all work very differently than we did before. We have proven in many cases that work is about what you do, not where you are. Cultural pressures and inherited mistruths have been not only challenged but turned on their heads. The future of work can be summarised as follows:

    People can and will want to work from different locations so that they can better balance their lives

    Technology is rarely the inhibitor to change, culture or lack of training is usually the barrier

    Digital services will augment what we do in the workplace and how people interact with these services. This doesn’t mean replacing people, rather providing a choice as to how people connect and consume services

    New skills will be needed from us all. Just as the workplace evolves, so must we. Basic, repetitive tasks will be automated or digitised.

    Workplace evolution is underpinned by modern technology, so the question to ask is how far along are you with replacement of ageing or legacy technologies and embracing cloud services. Failure to do so will limit the ability to transform and innovate in services to consumers.

The future of work is ever evolving; the question is; will you?