• Hunting for technology’s hidden gems

    Many challenged technology companies have hidden gems among their operations – whose value they could unlock if they only looked at them in the right light.

  • Global technology M&A 2Q15: final look

    Disclosed deal value for 2Q15 alone topped the full-year totals for four of the previous eight years. Take a closer look at this frenzy of activity.

  • Stack to solution

    As cloud continues to transform the industry, technology stacks are being displaced by cloud-integrated solutions. Is your company prepared for a big transformation?

  • Cash in the cloud

    Technology companies saw improvements in working capital in 2014, but the results were far from uniform. Learn more.

  • Technology Capital Confidence Barometer

    A growing sense of confidence amid global digital transformation should continue to drive technology M&A through 2015, according to our latest research.

  • Top of mind: Unlocking merger value of business behaviors

    As technology mergers soar, companies should focus on business behaviors – not culture – to achieve a smooth integration process.

  • Navigating the four themes of technology disruption

    Cloud solutions are changing the technology sector like never before. We’ve identified four themes that are part of this change and are impacting technology companies.

  • Top of mind: deal integration

    Integration practices have to catch up with an extremely fast-changing technology landscape. Explore how a new approach to deal integration for technology companies offers flexibility.

  • Sustaining digital leadership

    How can media companies embrace tech? We discuss agile technology strategies for growth, business models and customer engagement.

Technology

Operating in a new era

Technology is a multifaceted, influential and fluid industry whose executives must manage the art of being agile while focusing on operational excellence and meeting greater consumer demand. Our worldwide team of industry-focused assurance, tax, transaction and advisory professionals has the deep sector knowledge and technical experience to interpret the market and help you compete powerfully.

Key issues in today's technology environment include:


  • Cloud computing

    Is cloud computing transforming the industry?

    The IT services now known as cloud computing have been around for decades, but they never grew beyond a small fraction of total industry revenue. Now, however, their time has come: over the past few years, a dizzying array of hardware and software available as services over the internet has emerged.

    Consumers and businesses have embraced a multitude of cloud services, from mature sales force management services to email and photo editing to the latest smartphone applications and the entire social networking phenomenon. Further, researchers project an imminent inflection point in the adoption of cloud services by organizations both large and small.

    As cloud adoption becomes widespread, its characteristic of enhancing business agility is likely to lead to an increasing pace of change for all industries worldwide. Adding fuel to the interest in cloud computing is that cloud services advance “green” agendas: they allow fuller utilization of shared infrastructure capacity, thus consuming less power and lowering the carbon footprints of their users versus alternative IT approaches.

    Visit our cloud computing resource site.

  • Social networking: creating a presence

    Some organizations are creating a presence on social networks to promote products and services and to communicate directly with their customers.

    • But when an organization creates a profile for this purpose, how does it define and communicate its privacy practices for the information it collects?
    • And how should employees who communicate with customers on an individual basis use the additional personal information available to them from their customers’ profile?

    These are all questions companies using social networks as a sales or promotion tool should be asking.

    Organizations also need to be aware that social media sites can be abused for fraud purposes and that the information that is collected by the site is not in the control of the organization and will likely end up “living” longer than the organization intends or expects.

    Policies and training are key 

    It is important that organizations develop and communicate thoughtful policies that address interactions among customers, employees and job candidates. 

    Merely disabling social network use in the workplace is not a sustainable solution 

    The reliance on these policies is especially paramount in an environment where regulatory requirements do not easily align with technology and its common uses. Awareness campaigns and training must accompany the policy changes.

    Related content

  • Information security in a virtual world

    Business is moving into the virtual world as more and more data is transmitted over the internet, and cloud computing, social networking and mobile devices become more prevalent.

    Our 14th annual Global Information Security Survey confirms that information security is one of the most important issues facing organizations today.

    Overall, we have identified three trends with a significant impact on the role and importance of information security:

    • Physical boundaries are disappearing as more business data is transmitted over the internet
    • The pace of change continues to accelerate
    • Companies are moving from the more traditional outsourcing contracts to cloud service providers

    Are you prepared for the risks?

    Related content

    EY - Privacy trends 2012

    Privacy trends 2012

    To achieve greater accountability, many organizations will have to rethink their approach to privacy.

    EY - Attacking the smart grid

    Attacking the smart grid

    Learn about the changing landscape in control system architecture and how to perform a penetration test safely and effectively to benefit your organization.

    EY - Mobile Device Security

    Mobile device security

    We explore methods to assess and mitigate the risks related to today’s most popular mobile device platforms and technologies.

    EY - Data loss prevention

    Data loss prevention

    The blurry line between work and personal use of data can result in leaks – unintentional or malicious. Learn to identify and address these leaks.



Connect with us

Stay connected with us through social media, email alerts or webcasts. Or download our EY Insights app for mobile devices.

Cloud computing resource site

EY - Cloud Computing resource site

Discover our latest publications and videos on cloud computing here.


Join our LinkedIn group

Become a part of our EY Technology industry insights group on LinkedIn. Connect with your peers and receive the latest EY insights.


Global Information Security Survey 2014

Our annual survey finds organizations are still unprepared for inevitable cyber attacks. Learn how to get ahead of cybercrime.