Four years ago, in June 2010, Forrester Analyst Michele Pelino wrote a blog post that summarized the top questions that Forrester clients asked about mobile devices and mobile applications. Pelino wrote that in the previous 12 months, 700 of the 22,000 inquiries that Forrester analysts fielded from clients were related to enterprise mobility issues, a jump from 360 in 2007.Read More
When business travelers are on the go and need to print, a trip to the business center at a hotel, airport or convention center can be a lifesaver. This week, however, security blogger Brian Krebs published a memo from the U.S. Secret Service warning that criminals have been compromising hotel business center PCs with keystroke-logging malware, in a bid to steal personal and financial data from guests.Read More
Every year, tech venture capital leader Kleiner Perkins Caulfield Byers (KPCB) publishes a report on Internet trends. And every year that report serves as a snapshot that developers, investors and CIOs use to help them plan ahead and check their understanding of important trends.Read More
According to Gartner, nearly 2.2 billion smartphones and tablets will be sold to end users in 2014. And it’s a good bet that most of them will wind up housing at least some data that belongs to the device owner’s employer.
Earlier this month, Google announced a new Chrome browser add-on dubbed End-to-End, which is designed to make email more secure. While some media reports trumpeted the move as an attempt to “fly in the face of the National Security Agency”, most reported it simply as an added layer of security for messages delivered via the Internet.
Football – not the American-style game played with a pointed ball by men in helmets and pads, but the global game played with a round ball by men in shorts -- is suddenly a hot topic in U.S. IT circles.
Whether you work in a small business, a growing mid-size business, or a large enterprise, protecting your business from cyber threats can seem like a daunting task. A smaller business may not need the robust protections required for an enterprise, but regardless of the size of your business there are five basic steps that are absolutely essential.
By Andrew Hay
Mobile device management (MDM) solutions provide security, reporting, and management for mobile devices that access corporate networks. Gartner defines Enterprise mobile device management (MDM) software as a:
Whether it’s a school, small business, or large enterprise tablet rollout, the subject of mobile printing usually comes up during the first few weeks. The questions usually show up at the help desk, in the form of users who fully expected to be able to print from the new iPad or Android tablet just as easily as they did from their laptop or desktop PC.