How machine learning is helping to stop security breaches with threat analytics

Bottom line: Machine learning is enabling threat analytics to deliver greater precision regarding the risk context of privileged users’ behavior, creating notifications of risky activity in real time, while also being able to actively respond to incidents by cutting off sessions, adding additional monitoring, or flagging for forensic follow-up.

Separating security hacks fact from fiction

It’s time to demystify the scale and severity of breaches happening globally today. A commonly-held misconception...

By Louis Columbus, 27 June 2019, 0 comments. Categories: Applications, Data & Analytics, Enterprise Mobility, Security.

Myth-busting mobile in the enterprise: Combining speed with sustainability in device rollout

Opinion Technology moves at a remarkable pace of acceleration. For enterprises, that means “the perfect solution” is a dynamic moving target. Unfortunately, your mobile spend capacity and business requirements are not as dynamic, so creating a mobility program for those needs is no small feat. Does that mean that the speed of mobility will always outpace your capacity to engage and harness it for your enterprise?

By Ross Homans, 24 June 2019, 0 comments. Categories: Applications, Employees, Enterprise Mobility.

The 2019 CIO strategy analysed: Leaders needed combining CIO knowledge and CEO flair

The role of the CIO in 2019 remains a fascinating one. Where do companies invest in their technology initiatives? What position does the CIO hold? What emerging technologies need to be explored?

According to the 2019 CIO survey from Harvey Nash and KPMG, which polled more than 3,600 IT leaders, almost two thirds (63%) of organisations are now allowing technology to be managed outside the IT department.

By James Bourne, 14 June 2019, 0 comments. Categories: CIO, Development, Employees, Enterprise Mobility, Research.

SentinelOne raises $120 million in Series D funding to automate enterprise endpoint security

California-based endpoint security software provider SentinelOne has raised $120 million (£94m) in a recently conducted Series D round led by Insight Partners.

Samsung Venture Investment Corporation, Third Point Ventures, Redpoint Ventures, NextEquity, Data Collective, and other firms also participated in the funding round.

SentinelOne offers security services to companies...

By Enterprise CIO, 07 June 2019, 0 comments. Categories: Data & Analytics, Data Loss, Enterprise Mobility, Security.

Is the speed of mobile technology too fast and too furious for the enterprise?

Opinion If you think of technological advancement for the enterprise as a highway, there seem to be two distinct lanes with very different speeds.

The first lane is where “traditional” technology such as monitors, laptops, and desktops live. While OEMs refresh this technology every year (usually timed to chipset refreshes from Intel and their...

By Ross Homans, 03 June 2019, 0 comments. Categories: Applications, Employees, Enterprise Mobility, Tablet, Wearables.

Australian enterprise 5G market likely to generate billions – and be critical for business applications

The Australian enterprise 5G market is predicted to generate nearly $45 billion AUD (£24.5bn) on an annual basis by the mid-2020s, including next generation application development, IT services, platforms and connectivity, according to Telsyte.

The market researcher’s latest report found more than two-thirds (68%) of IT and business leaders already perceive 5G as an important technology for their business strategy...

By Enterprise CIO, 30 May 2019, 0 comments. Categories: Applications, Enterprise Mobility, Productivity.

Why getting better connected could lead to a better world

Amid uncertainty, there’s one certainty; business is more global than it has ever been, and trading with partners, customers and suppliers across the world is set to characterise business in the future. Connectivity lies at the heart of collaboration and is central to knowledge, idea and information sharing which are essential for businesses to become more productive and efficient as they make their digital transformation journeys.

There’s no room for isolation in the digital economy. Even on a...

By Daniel Creigh, 22 May 2019, 0 comments. Categories: BYOD, Collaboration, Enterprise Mobility, Productivity, UX.

IoT, AI and blockchain all key to digital transformation – but ensure you get the millennial view

It is widely accepted that a confluence of emerging technologies will be key to future business transformation. Yet there may be a difference of opinion dependent on generation, according to a new report.

The study, from KPMG, aimed to highlight divergent opinions between global tech leaders and millennials. According to the report – which polled more than 740 business leaders and 600 millennials working in the...

By James Bourne, 14 May 2019, 0 comments. Categories: Applications, Enterprise Mobility, IoT, Productivity.

The big enterprise security problem posed by small – or at least smaller – businesses

As the threat level grows and diversifies, global enterprises continue to make cybersecurity a top priority. As they should: high-profile attacks continue to wreak havoc on major brands—with Humana and Marriott among the most notable recent victims. One silver lining in the continued fight is that the pervasiveness of threats has elevated cybersecurity from an IT problem to a board-level issue.

In fact, according to

MobileIron aims to kill off the password completely with further move to Zero Trust

Enterprise mobile software provider MobileIron has announced an update to its Access mobile security and identity platform with a zero sign-on solution which aims to finally replace the password as a security authenticator.

The company’s vision is to enable enterprises to use their mobile devices as their digital identity to access enterprise services and data, built on its unified endpoint management (UEM) platform and powered by...

By James Bourne, 08 May 2019, 0 comments. Categories: CIO, Employees, Enterprise Mobility, Privacy, Security.