Each year, Gartner Research reviews the leading enterprise mobility management (EMM) suites, and ranks them based on performance, customer feedback, and product features as well as company stability. The 2014 Gartner Enterprise Mobility Management Magic Quadrant report lists five leaders in the category:Read More
The Information Commissioner’s Office (ICO) for the United Kingdom recently issued its annual report on fines given to companies that failed to protect consumer data, and a surprising number of those fines were given out for data that involved data loss traced to multi-function devices (MFDs) such as copiers and scanners or multi-function printers (MFPs), including printed records and faxes.Read More
As any IT professional can attest, the main challenge with BYOD can be summed up in a single sentence. “IT does not control the content and configuration of the device.”
Since the mobile devices belong to individual employees, IT policies calling for the company to view or wipe personal data are problematic. So most enterprise mobility management or mobile device management tools piggy-back on top of the user’s personal data, so that it can be removed when the device is no longer used for work.Read More
Once upon a time, the goal of IT security professionals was to create an impenetrable security wall to protect company assets from outside thieves and hackers. IT World Canada says that’s an outdated idea, and CIOs in 2015 have given it up in favor of more achievable goals.
The article by Nestor Arellano says that mobile device headaches have changed cyber security forever, and that connected devices of all kinds have created a third platform that forces CIO’s to shift their focus towards risk assessment rather than the “outdated perception” of creating an impenetrable wall around the corporate network.Read More
According to the Darkreading security blog, 2014 was a year when IT got BYOD wrong. In an article based on the results from a Bitdefender survey Darkreading said the numbers prove that we’re doing BYOD wrong.Read More
Until the 21st century, only a very few professionals – doctors, firefighters, police officers – were “on call” when they weren’t actually at work. They carried pagers, or had a regular “check-in” time with an answering service.Read More
Each year since 2010, the annual InfoTrends survey of knowledge workers in Europe and the U.S. has reported that workers spend up to half their working hours away from hard-wired network access. This means that they’re relying on wireless access via WiFi, VLAN, or cellular connections to access, share, and print the information they need.Read More
With more than 1.2 billion workers using tablets or smartphones in the course of their everyday jobs – about 75.5% of all employees, according to IDC – and the compound annual growth rate of enterprise spending on tablets expected to be 48% over the next five years according to Veritec, it’s no surprise that companies are scrambling to secure these vital business tools. And they’re doing a good job of minimizing the risks posed by mobile devices, analysts agree, with one glaring exception: printing infrastructures in most American businesses have not kept up with mobile technology.Read More
According to a February 2013 report from Zogby Analytics, nearly 80 percent of American investors say they aren’t likely to invest in companies that have suffered multiple cyber attacks. It’s no wonder, since analysts at the Ponemon Institute estimate that data breaches cost large enterprises an average of $5.4 million per breach and can erode brand value by hundreds of millions of dollars.Read More
When it comes to data security, the most obvious solution is to lock down the choices that employees have. That’s what most companies did a decade or more ago, when Cloud-based solutions were still on the drawing board and it was common for employees to be issued a laptop and BlackBerry for work usage.
Prat Agarwal, director of business development at secure mobile printing leader Breezy, says that in today’s world, the key to a secure environment is locking down data – not vendor choice. There are many reasons that locking down device and software choices no longer work, he says.Read More