The state of enterprise mobility at retail's big 2019 show

By Micah Robinson – Content Manager, Stratix

Another blockbuster edition of NRF Retail’s Big Show has come and gone, and it is an excellent opportunity to take stock of where enterprise mobility in the retail industry has been, where it is now, and where it looks to go. Let’s break down some of the most notable happenings and insights concerning mobile devices and services gained at the conference:

Bye-bye, dedicated devices. Hello, multi-purpose mobile...

By Stratix, 25 January 2019, 0 comments. Categories: Applications, Enterprise Mobility.

Why marketing security is the phrase every executive needs to understand in 2019

Headlines around data breaches have become the new norm in today’s digital age. These kinds of headlines are accompanied by new financial consequences for the breached companies in the form of hefty potential fines for non-compliance and class-action lawsuits for failing to adequately protect consumer data.

Enterprise executives around the world watch such news with great interest, but very...

By Marty Greenlow, 24 January 2019, 0 comments. Categories: Data & Analytics, Employees, Security.

Key tips for SMEs and encryption: Ease of use and accessibility vital – but don’t skimp on security

Becrypt has been in the disk encryption business for more than 15 years and has carried out extensive work with governments and large enterprises. Today, a lot of what we're doing is working with small businesses, typically organisations that are looking at adding encryption for the first time, driven by regulation such as GDPR, and those that require encryption as part of the privacy enforcing mechanisms.

Based on...

By Bernard Parsons, 22 January 2019, 0 comments. Categories: Data & Analytics, Data Loss, Design, Employees, Security.

Gartner notes significant uptick in enterprise AI implementation

More than one in three (37%) enterprises polled by analyst firm Gartner say they are deploying artificial intelligence (AI) – representing a 270% rise from four years ago.

The results show that though organisations across all sectors analysed use AI in a number of applications, there is an acute shortage of talent. The study, which surveyed more than 3,000 CIOs from various industries in 89 countries, aims to help these...

By Enterprise CIO, 21 January 2019, 0 comments. Categories: Applications, Employees.

Four things every CEO needs to know about ransomware

It’s hard to read the news at the moment without ransomware being mentioned. For example, I typed “ransomware” into Google News recently and got more than one million hits in 0.23 seconds. Even when I limited my search to the past 24 hours it returned more than six pages of links. Therefore, with so many experts writing things that are sufficiently interesting or important to feature as “news” — why has the problem not yet been...

By Dr. Sandra Bell, 21 January 2019, 0 comments. Categories: CIO, Data Loss, Employee Education, Employees, Malware, Security.

Enterprise mobility advances in 2019: BYOD, cybersecurity, and advanced tech

Enterprises today are growing increasingly dependent on the remote workforce, which brings mutual benefits to employer and employee—but also management challenges, security risks and productivity concerns.

As more businesses adopt and manage mobile technology to keep remote workers connected, telecom and IT managers will see major developments in four key areas of enterprise mobile management—bring your own device...

By Josh Garrett, 18 January 2019, 0 comments. Categories: Applications, BYOD, Enterprise Mobility, Productivity, Security.

Google launches beefier Android Enterprise Recommended program – with nine EMM partners

The bar which has just been set for getting to grips with Android in the enterprise is higher than ever – with the launch of a new Google program.

Android Enterprise Recommended has launched with nine partners which Google says has been able to demonstrate a variety of requirements, from a ‘proven ability to deliver advanced security and management features’, as well as a consistent deployment experience and...

By James Bourne, 17 January 2019, 0 comments. Categories: Android, Applications, Enterprise Mobility, Security.

How CEOs are applying digital reinvention to fuel growth

Now more than ever, CEOs and their leadership teams must counter the threat of digital disruption. Within the evolving global economy, debate and analysis about business technology adoption must result in purposeful action. Even the trailing organisations are prepared to learn something actionable from their trailblazer peers.

The following statistics and insights are excerpts from the IBM Institute for Business Value (IBV) Global...

By David H Deans, 16 January 2019, 0 comments. Categories: CIO, Data & Analytics, Employees, Productivity.

Yubico introduces NFC-enabled security key and connector

Hardware authentication device manufacturer Yubico has introduced two new device form factors, namely the Security Key NFC and the YubiKey Lightening connector for iPhones and iPads, at the ongoing CES 2019 event in Las Vegas, Nevada.

Manufactured in the US and Sweden, the Security Key NFC is made from reinforced fiberglass that is hermetically sealed and injection moulded into a monolithic block, which delivers remarkable...

By Enterprise CIO, 15 January 2019, 0 comments. Categories: App Platforms, Security.

How new thinking on ERP is igniting intelligent growth for midsize businesses

ERP software comes with an endless array of formats, environments, interfaces, and capabilities. However, knowing which offering to implement is still a challenge. As operations grow and expand into new locations, midsize businesses can quickly outgrow existing technology.

But this reality shouldn’t keep midsize businesses from adopting an ERP system. Instead, they should upgrade their...

By Dr. Michael Schmitt, 15 January 2019, 0 comments. Categories: Applications, Big Data, Employees.

Operationalise innovation: How insurance CIOs can outsmart the disruptors

For a long time, big insurers held all the aces. Decades of brand history, the protective effect of stringent regulation and large balance sheets kept competition at bay. This is now rapidly changing. The new players on the block hold the cards of agility, innovation and freedom from the millstone of legacy technology. They can use AI, cloud and IoT technology to meet escalating customer demand for highly personalised, seamless mobile digital services.

By Garry Larner, 14 January 2019, 0 comments. Categories: CIO, Data & Analytics, Productivity, RMAD.

Most cybersecurity research focusing on CPS, IoT and cryptography – but where is AI?

As cybersecurity continues to be a vital area for practically every organisation, the good news is that research continues to be strong in the field.

That’s the latest finding from Crossword Cybersecurity. The company looked at almost 1,200 current and past projects from academic institutions across four continents and found several trends which had emerged since 2013.

There were...

By James Bourne, 10 January 2019, 0 comments. Categories: Data & Analytics, Research, Security.

Enterprise IT infrastructure spend was strong in 2018 – with future outlook steady

Enterprise IT infrastructure had a more than solid year with spending jumping 13% in 2018, according to the latest note from Synergy Research.

Aggregate revenues for the last four quarters hit $125 billion, with data centre servers being both the most lucrative market and the highest growing, at almost 26% year over year.

As ever, the cloudy side of the house saw greater gains, with...

By James Bourne, 09 January 2019, 0 comments. Categories: CIO, Cloud , Productivity, Research.

New guidelines aim to help healthcare CIOs with cybersecurity initiatives

CIOs in healthcare will without exception have cybersecurity as one of their primary focus areas for 2019 – if not their biggest priority. To help in this quest, the Department of Health and Human Services (HHS) has published a checklist of security best practices to help ensure a ‘holistic view of the intersection between cybersecurity and healthcare’, in the organisation’s own words.

The

By James Bourne, 07 January 2019, 0 comments. Categories: CIO, Data Loss, Security.

Bringing together blockchain, IoT and AI: Turning Skynet into reality?

The events of annus horribilis 2008 changed the world forever. The change was dubbed the "New Normal" and in turn gave rise to shifts in economic and political power which would have been considered the stuff of fantasy fiction as 2008 came to a close.

Fast forward 10 years. Shifts in the financial tectonic plates apart, we have seen the rise and rise of social media as the facilitator of both social and political...

By Keith Bedell-Pearce, 04 January 2019, 0 comments. Categories: Applications, CIO, IoT.

Microsoft beefs up 365 security and compliance with more advanced offerings

Microsoft is certainly not letting up just because it is the start of the year. The company is launching two new offerings for its enterprise-focused Microsoft 365 suite around increasing security and compliance.

The solutions, around identity and threat protection and information protection and compliance respectively, aim to tie up a few more of the disparate areas within the Microsoft enterprise portfolio. Identity and...

By James Bourne, 03 January 2019, 0 comments. Categories: Enterprise Mobility, Microsoft, Security.

Averting disaster: Get back to business faster with predictive analytics

Across the globe natural disasters are occurring at an alarming rate. In 2018 alone, we’ve witnessed the devastating effects of the Indonesian earthquake and tsunami, flooding and mudslides in Japan, flash floods in Jordan, Super Typhoon Mangkhut in the Pacific Ocean and numerous hurricanes that battered the Atlantic coast of the US – just to name just a few. While the impact of destructive weather on people’s lives takes priority, it...

By Steve Smith, 03 January 2019, 0 comments. Categories: Collaboration, Data & Analytics, Productivity.

Exploring the future of the open source ecosystem in light of the Red Hat acquisition

IBM’s recent acquisition of Red Hat for $34 billion was a surprise to many in the open source community while also a cause for concern within, and for, the open source ecosystem.

Bob Young and Marc Ewing created a defining moment when they founded Red Hat 25 years ago. They helped fuel not only what has become the norm for development and open source but also the widespread adoption of open source by companies. Not surprisingly, Red Hat became synonymous with both the Linux operating system (OS) and...

By Bart Copeland, 21 December 2018, 0 comments. Categories: Opinion.