Myth busting mobile application management
There’s a half-truth blazing its way through the enterprise mobility marketplace. Organisations are being told, by vendors who are at best uninformed and at worst being dishonest, that having an app store means you have MAM.
This deception needs to end, now.
Mobile application management is not merely the standing up of a customised app store, advantageous as that may be. Mobile application management is a systems-management view of enterprise mobile apps. It encompasses deployment, configuration,...
How smart is your corporate network?
By Adrian Thirkill, Easynet’s UK Managing Director
IT has undergone a major reputation overhaul over the past five years, emerging from the murky help desk basement into the mainstream. The mass adoption of Twitter, Facebook, LinkedIn and other social networking sites, and the devices driving this, are hugely responsible.
Whether it’s a pointless but amusing app that makes your voice sound like you’re underwater, or the arguably more useful banking-on-the-move app, when octogenarians are...
Cisco security report reveals its personal device policy
“Mobile at Cisco is now BYO, period”, says report
Computing giant Cisco has published its annual Security Report, and has revealed company policy on a range of topics, including BYOD and network security.
Under the ‘BYOD update’ section, Cisco revealed that there were 60,000 devices in use from 70,000 employees, with 14,000 of the devices being iPads.
This may be something of a surprise. Back in October Context...
No BYOD means companies can get left behind, says Dell
A survey from Dell and conducted by Vanson Bourne has shown that, for six in 10 companies, without BYOD they fear they could “get left behind”.
The research, which interviewed 1,485 IT heads from 10 countries across four continents, attempted to answer the questions of whether companies should focus on users or devices when developing a BYOD strategy; the pitfalls of BYOD, and whether personal device policies are solely user-driven or not.
The top-line takeaways from the Dell report were:
- Nearly six in 10 (59%) organisations say that without BYOD “they could get left...
Intel focusing on enterprise app space #AppsWorld
Intel is using its Intel Developers Conference this year to push towards enterprise apps and engaging developer communities.
And according to the computing giant, this year will see huge leaps in the enterprise app space.
“We think 2013 is the year of the enterprise app,” writes Intel in an industry view, adding: “CIOs from most industries will be accelerating their efforts to expose their enterprises to the exciting mobile...
Putting mobile technology into a government policy perspective
Mobile devices have captured the imagination of the general public and business leaders alike. Mobile technology is often viewed as all about a personal experience and personal productivity. However, if we look at mobile only from that perspective, we may overlook what has become one of the big social realignments of our time. Mobile has created a massive realignment in the way we communicate and derive business value. The sheer scale of this change has created its...
Windows 8 brings Security-by-Design to the mainstream
For some time, layering security software on top of a device has been the approach that thousands of enterprises (and software security providers) have relied on in their quest to protect information and evade network threats. It’s easy to see why – it’s the approach that’s been sold to them.
Yet, software security has never been the ‘one and only’ answer on its own. Hackers are clever people, with an increasingly sophisticated range of techniques to infiltrate the layers...
CIOs must scrutinise the security of their cloud setup
Research from IT recruitment consultancy Robert Half Technology has brought up an all too familiar story – CIOs are not testing the security credentials of their cloud vendor.
The latest figures suggest that 55% of the CIOs surveyed haven't tested the security procedures that their cloud vendor provides, despite the threat of expensive retrospective action.
Similarly, recent research has revealed that fewer than half of CIOs test cloud security systems and procedures. At the same time, the survey,...
5 ways BYOD can harm your company
It's becoming more and more common for workers to store work-related documents on their smartphones, tablet computers and other devices they bring to and from work each day. While this can be convenient - employees can access important documents at home or on the road - it also creates greater security risks for businesses.
Employees’ devices may not be secure
Many employees’ devices have operating systems that are vulnerable to hacking attacks or viruses. This is especially true if the...