It’s time to re-energise IT – and make the IT department more than a M*A*S*H unit


There’s no holding back the obvious truths in the land of IT. Helpdesks are inundated and overwhelmed; we are overworked and our teams are scrambling for some lucidity. The problem is simple, and most of us know: mundane, repeated and wearisome tasks that can, or probably should, be automated.

Much stress and time could be saved for our IT team’s employees by taking away some of these entanglements, but many organisations overlook doing so in the name of convenience...

By Dean Wiech, 07 February 2017, 0 comments. Categories: Employees, Identity, Security.

MobileIron introduces SSO for native apps to cure ‘app to cloud security’ gap


Enterprise mobility management (EMM) software provider MobileIron has announced single sign-on (SSO) capability for its Access platform, which enables users to only input their passwords once across different applications.

“Enterprises embracing mobile and cloud services expect the same security and single sign-on capabilities to work for their native mobile apps as with web-based accessed from a PC,” wrote Vijay Pawar, MobileIron director of product management

By James Bourne, 22 November 2016, 0 comments. Categories: Applications, Enterprise Mobility, Identity.

Two recent examples of how digital has the potential to transform healthcare


Whether it’s through applications, devices, or the data tying it all together, it’s evident that with the right path technology can transform healthcare. Two recent examples, from third sector technology provider Eduserv and open source tech giant Red Hat respectively, have shed some light on the challenges and opportunities the industry faces from both a European and American perspective.

The former comes through a recently released executive report – the second...

By James Bourne, 14 November 2016, 0 comments. Categories: Applications, Enterprise Mobility, Identity.

Why the future of identity is up in the clouds


In the last year, the volume of CIO mandates to be “cloud first” or only adopt cloud applications going forward, has increased significantly in large enterprises. Research from IDC forecasts that by 2019 enterprises will be spending more than £100 billion annually on cloud services.

When approached in the right manner, the cloud can deliver considerable benefits to organisations. But, there are several new challenges...

By Kevin Cunningham, 13 September 2016, 1 comment. Categories: CIO, Cloud , Identity.

The four steps to ensuring BYOD doesn’t affect the network


A note from enterprise network security provider Hypersocket Software argues how wearable tech and wear your own device (WYOD), as well as the Internet of Things (IoT) are further challenges on the horizon for organisations struggling to cope with a BYOD infiltration.

Lee Painter, CEO of Hypersocket, notes four ‘essential’ steps for organisations to take to ensure network security in the BYOD age. “Personal devices should pose no greater danger than company-issued...

By James Bourne, 09 September 2016, 1 comment. Categories: BYOD, Enterprise Mobility, Identity, Security.

How to ensure customer and employee satisfaction with multiple service desks


The Service Desk Institute recently researched the phenomenon of having several service desks in one organisation. The interesting thing about this research is that it provides numerical proof of what is happening in this area.

Their research reveals that 90% of the questioned organisations have more than one service desk. This means that almost every employee has to first consider where they send their request when they need service.

This often goes well for most, but it is not uncommon...

By Wolter Smit, 02 September 2016, 0 comments. Categories: Employees, Enterprise Mobility, Identity.

VMware announces new unified endpoint management and Windows 10 support

(c) Krakowiak

Day two of VMworld focused the conversation on VMware’s enterprise mobile arm, with the company announcing new unified endpoint management and identity management capabilities, as well as support for Windows 10.

Sanjay Poonen, who heads VMware’s end user computing segment, only had 30 minutes to play with, and as a result went through the portfolio at some speed. Unlike the ‘death by PowerPoint’ approach favoured in a lot of keynote sessions, the audience...

By James Bourne, 31 August 2016, 0 comments. Categories: Enterprise Mobility, Identity, Security.

Okta gives gloomy outlook for enterprises with legacy security systems


Almost two thirds of IT leaders expect a serious data breach to hit their companies within the next 12 months, according to the latest research from cloud identity and device management provider Okta.

The pessimistic finding, which was compiled from surveying 300 IT and security professionals, contained some other head-scratching results. There was a clear lack of consensus over whether security enables or compromises productivity and agility, with 52% saying it’s a compromise,...

By James Bourne, 22 August 2016, 1 comment. Categories: Employees, Enterprise Mobility, Identity.

Dashlane launches Spaces for mobile to separate work and personal passwords


Password management provider Dashlane has announced the launch of Spaces for mobile, which enables employees to separate business and personal information by using their business and personal passwords on mobile devices.

The company claims moving its Spaces product, launched last month, to mobile will be a ‘major step forward’ in helping businesses and IT manage the BYOD trend. “Companies and employees alike want to protect their credentials, and separate personal...

By James Bourne, 25 July 2016, 1 comment. Categories: Enterprise Mobility, Identity, Security.

It’s time to modernise authentication methods – or suffer the consequences


“Even the technology that promises to unite us, divides us” – Dan Brown, Angels & Demons

The way digital enterprises connect with their customers is changing.

Consumers are demanding more trusted and personalised experiences in exchange for their personally-identifiable information (PII), while businesses are struggling to protect user privacy in light of growing global security and privacy concerns.

Traditional authentication solutions and methods were simply...

By Richard Lack, 14 July 2016, 0 comments. Categories: Employee Education, Employees, Identity, Security.