Myth busting mobile application management

There’s a half-truth blazing its way through the enterprise mobility marketplace. Organisations are being told, by vendors who are at best uninformed and at worst being dishonest, that having an app store means you have MAM.

This deception needs to end, now.

Mobile application management is not merely the standing up of a customised app store, advantageous as that may be. Mobile application management is a systems-management view of enterprise mobile apps. It encompasses deployment, configuration,...

By App47, 07 February 2013, 0 comments. Categories: Enterprise Mobility, MDM, Security.

How smart is your corporate network?

By Adrian Thirkill, Easynet’s UK Managing Director

IT has undergone a major reputation overhaul over the past five years, emerging from the murky help desk basement into the mainstream. The mass adoption of Twitter, Facebook, LinkedIn and other social networking sites, and the devices driving this, are hugely responsible.

Whether it’s a pointless but amusing app that makes your voice sound like you’re underwater, or the arguably more useful banking-on-the-move app, when octogenarians are...

By Easynet G.S., 01 February 2013, 0 comments. Categories: BYOD, CIO, Enterprise Mobility, Mobile Analytics, Security.

Cisco security report reveals its personal device policy

“Mobile at Cisco is now BYO, period”, says report

Computing giant Cisco has published its annual Security Report, and has revealed company policy on a range of topics, including BYOD and network security.

Under the ‘BYOD update’ section, Cisco revealed that there were 60,000 devices in use from 70,000 employees, with 14,000 of the devices being iPads.

This may be something of a surprise. Back in October Context...

By James Bourne, 31 January 2013, 0 comments. Categories: Big Data, BYOD, Enterprise Mobility, Security.

No BYOD means companies can get left behind, says Dell

A survey from Dell and conducted by Vanson Bourne has shown that, for six in 10 companies, without BYOD they fear they could “get left behind”.

The research, which interviewed 1,485 IT heads from 10 countries across four continents, attempted to answer the questions of whether companies should focus on users or devices when developing a BYOD strategy; the pitfalls of BYOD, and whether personal device policies are solely user-driven or not.

The top-line takeaways from the Dell report were:

  • Nearly six in 10 (59%) organisations say that without BYOD “they could get left...

By James Bourne, 30 January 2013, 0 comments. Categories: BYOD, Enterprise Mobility, Security.

Intel focusing on enterprise app space #AppsWorld

Intel is using its Intel Developers Conference this year to push towards enterprise apps and engaging developer communities.

And according to the computing giant, this year will see huge leaps in the enterprise app space.

“We think 2013 is the year of the enterprise app,” writes Intel in an industry view, adding: “CIOs from most industries will be accelerating their efforts to expose their enterprises to the exciting mobile...

By James Bourne, 29 January 2013, 0 comments. Categories: CIO, Development, Enterprise Mobility, Security.

Putting mobile technology into a government policy perspective

By Kevin Noonan, Research Director, Public Sector

Mobile devices have captured the imagination of the general public and business leaders alike. Mobile technology is often viewed as all about a personal experience and personal productivity. However, if we look at mobile only from that perspective, we may overlook what has become one of the big social realignments of our time. Mobile has created a massive realignment in the way we communicate and derive business value. The sheer scale of this change has created its...

By Ovum StraightTalk, 24 January 2013, 0 comments. Categories: Enterprise Mobility, Mobile, Security.

Windows 8 brings Security-by-Design to the mainstream

For some time, layering security software on top of a device has been the approach that thousands of enterprises (and software security providers) have relied on in their quest to protect information and evade network threats. It’s easy to see why – it’s the approach that’s been sold to them.

Yet, software security has never been the ‘one and only’ answer on its own. Hackers are clever people, with an increasingly sophisticated range of techniques to infiltrate the layers...

By Wave Systems, 23 January 2013, 0 comments. Categories: Microsoft, Security.

CIOs must scrutinise the security of their cloud setup

Research from IT recruitment consultancy Robert Half Technology has brought up an all too familiar story – CIOs are not testing the security credentials of their cloud vendor.

The latest figures suggest that 55% of the CIOs surveyed haven't tested the security procedures that their cloud vendor provides, despite the threat of expensive retrospective action.

Similarly, recent research has revealed that fewer than half of CIOs test cloud security systems and procedures. At the same time, the survey,...

By Wave Systems, 21 January 2013, 1 comment. Categories: CIO, Cloud , Enterprise Mobility, Security.

5 ways BYOD can harm your company

It's becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient - employees can access important documents at home or on the road - it also creates greater security risks for businesses.

Employees’ devices may not be secure

Many employees’ devices have operating systems that are vulnerable to hacking attacks or viruses. This is especially true if the...

By Michelle Drolet, 18 January 2013, 0 comments. Categories: Big Data, BYOD, Enterprise Mobility, Security.