Four in 10 firms admit suffering crucial data loss from a mobile device

(c)iStock.com/Chunumunu

Four in 10 companies have suffered a loss of key corporate data from a mobile device, according to new research from industrial IT services provider NetEnrich.

The study, which polled 150 North America-based IT professionals, argues corporate IT is “hounded” by concerns over mobile security. More than half (54%) of respondents say getting employees to review the company’s policy on mobile devices is the most difficult part of managing employee use, while a similar...

By James Bourne, 14 September 2016, 0 comments. Categories: Data & Analytics, Data Loss, Employees, Enterprise Mobility, Security.

IDC: Two in three enterprises expect to boost mobility spend - despite issues

(c)iStock.com/erhui1979

Two thirds of enterprises plan to increase their mobility spending in the coming year, according to the latest research from analyst house IDC.

The research firm’s latest survey, the 2016 Mobile Enterprise Devices, Security, Services and Solutions Survey which quizzed more than 700 US IT decision makers in companies with over 100 employees, also found that three quarters (74%) of organisations either have or plan to implement a CYOD (choose your own device) policy, citing the...

By James Bourne, 05 September 2016, 0 comments. Categories: Data & Analytics, Enterprise Mobility, Security.

If you're not tracking performance, don't bother with enterprise apps

(c)iStock.com/ktsimage

Are you tracking and testing the performance of mobile apps in your enterprise? If you aren’t, you shouldn’t even bother with apps.

Okay—so maybe that’s a little dramatic. But the main premise of the statement holds true: if you aren’t tracking the performance of your suite of mobile apps, you’ll never realise their full potential.

Time and time again, we’ve talked about

By App47, 05 September 2016, 0 comments. Categories: Applications, Data & Analytics, Enterprise Mobility.

Examining the escalating threat of DDoS attacks

DDoS attacks have evolved into sophisticated multi-vector attacks at the network and application layers that can deplete resources very quickly and generate major service outages. Any enterprise and government organisation is at risk from the escalating threat of DDoS attacks. Download the White Paper from A10 to learn:

  • The evolution of DDoS attacks: more massive, more sophisticated, more devastating
  • How volumetric attacks target bandwidth and network components
  • How application attacks have become more complex and sophisticated
  • The elements you should consider for an...

By James Bourne, 25 August 2016, 0 comments. Categories: Data & Analytics, Data Loss, Security.

Validating DDoS threat protection: Ensuring your solution works in real-world conditions

Multi-vector DDoS attacks are overwhelming traditional security solutions and as a result, existing DDoS defense strategies must be re-evaluated. New DDoS solutions require horsepower and capabilities to deal with the volume and complexity of simultaneous attacks.


Download this whitepaper, Validating DDoS Threat Protection, to learn:

  • Classification of DDoS attack types
  • An approach on how to effectively mitigate DDoS Attacks
  • The importance of Performance Validation to ensure predictable operations
  • How IXIA validated high performance by A10’s TPS DDoS mitigation...

By James Bourne, 25 August 2016, 0 comments. Categories: Data & Analytics, Data Loss, Security.

Will you be part of the dawn of the intelligent 21st century enterprise?

(c)iStock.com/Olivier Le Moal

Digital technologies are fuelling a seismic shift in the modern business landscape, driven by changing customer expectations and mounting competition from new and nimble ‘born digital’ companies. This has given rise to a new breed of organisation; the 21st century enterprise, which is being forced to rethink traditional market approaches and become more service-centric in order to remain relevant.

To make this transition successfully, businesses must have the ability...

By Kalyan Kumar, 25 August 2016, 0 comments. Categories: Data & Analytics, Development, Employee Education, Employees, IoT.

The UCaaS market analysed: RingCentral, Fuze, West top Magic Quadrant

(c)iStock.com/urbancow

The good folks at Gartner have got the crystal ball out again, this time with regard to the unified comms as a service (UCaaS) marketplace – and found 8x8, BT, Fuze, RingCentral, and West Unified Communications in the leaders’ zone.

The report arrives at a fascinating time in the space. Enterprise collaboration and productivity as a whole has been bolstered in the past month by an array of deals from the major vendors.

By James Bourne, 25 August 2016, 0 comments. Categories: Collaboration, Data & Analytics, Productivity, Research.

Why cybersecurity must be a C-suite priority

(c)iStock.com/BlackJack3D

Digital technology has fundamentally changed business practice over the past decade. Cloud based applications dominate, workers routinely access corporate information remotely via smart phones and access to the corporate network increasingly includes supply chain members, contractors and part time workers.  Yet cybersecurity has failed to keep up – and some of the responsibility has to lie with the C-suite.

Why are cyber security experts not involved from day one in every...

By Adam Boone, 18 August 2016, 0 comments. Categories: CIO, Data & Analytics, Data Loss, Security.

How to get the most out of your BI analytics investment

(c)iStock.com/sorbetto

Companies looking to select the right business intelligence (BI) tool need to identify the degree of data analysis they need, how much technical expertise they have in-house, and work out whether they want to integrate existing platforms.

That’s the conclusion from a study conducted by B2B research firm Clutch.co analysing how organisations are attacking their BI strategies.

70% of the almost 300 employees polled – who use BI data analytics tools in their work – said...

By James Bourne, 16 August 2016, 0 comments. Categories: Applications, Big Data, Data & Analytics, Employees, IoT.

Should vendors be forced to give encrypted data to the government?

(c)iStock.com/maxkabakov

More than one in three IT pros believe cloud providers should be forced to give government access to encrypted data, according to the latest research study from the Cloud Security Alliance and data protection providers Bitglass.

The research, which appears in a report entitled Mitigating Cloud Risks, surveyed 176 information security professionals and found US-based respondents were more likely to be opposed to government information (64%) than their EMEA counterparts (42%). 10% of...

By James Bourne, 11 August 2016, 0 comments. Categories: Cloud , Data & Analytics, Privacy, Security.