BYOD users like the ease of consumer apps for messaging and calling, in both personal and corporate use. Does this undermine the security of enterprise messaging and business calling? What should the enterprise do to make sure that corporate data in messages and call logs are protected in this situation?
When people discuss advances in technology, the conversation often touches upon how quickly things are moving: one barely gets their hands on the latest iPhone or tablet before it is, effectively, obsolete. While it is difficult to ignore the rapidly shifting nature of mobile technologies, Sebastian Thalanany, the author of Mobile Evolution: Insights on Connectivity and Service, encourages us to take a new point of view: the confluence of this technology and art, and the profound impact of interdisciplinary and interdependent considerations in this blended landscape.
Download this paper today to learn about how combining the right hardware upgrades with newer OS options and endpoint management software can provide the needed protection against today’s security risks.
by Richard Rabins, Alpha SoftwareDespite the opportunities that mobilizing the workforce offers, enterprises have deployed a surprisingly small number of apps due to the challenges inherent with mobile app development. Read More >>>
Nubo Software announced today the launch of their new and enhanced Virtual Mobile Infrastructure (VMI) platform which can now be accessed from any computer with an internet browser. The first enterprise mobility solution in the world to develop VMI technology, Nubo’s new Version 2 client is the only remote workspace that is compatible with all HTML 5 web browsers, in addition to all Android and iOS devices.
A new Forrester report commissioned by IBM finds that companies can save 10% building an app and 20% running an app by following best practices – or have development costs double unless ten key cost drivers are kept under control
It’s that time of the year again. If it’s not a wrap-up of the noteworthy milestones or events of the year that’s about to close, we’re bombarded with tech predictions for the upcoming year from various experts and observers. Not that we’re complaining. And just so we showcase our solidarity with industry thought leaders who willingly share their expertise with the world, this article will be compiling some of the more prominent mobile predictions for 2015.
by Dan Pickett, nfrastructureWe predict that through next year, technology will only continue to become “consumerized” as devices become more connected, everything becomes software-defined and the Internet of Things becomes completely engrained in our everyday life. Read More >>>
by Rob Vandenberg, LingotekRemember when people first started talking about globalization in the 1980s? Branching out into new markets usually meant physically expanding to somewhere in Europe or the U.K. It required opening new offices, growing new markets through direct sales and having dedicated translators interpret content by hand. Read More >>>
It is no secret that mobile applications provide rapid, almost instantaneous access to data. They are the gateway to a new era of information sharing – unfortunately, they also have the ability to become the Achilles’ heel for data security. Personal data security is at the forefront of consumer concerns when they consider adopting mobile applications. It is easy to see why, when just within the past few weeks, a major retailer, a global bank, and a federal government agency all reported intruders had compromised the personal and financial information of millions of their customers and constituents.
There are now roughly two billion smartphone users in the world, and several hundred million tablet users. Add to that laptops and you get a considerable chunk of the world’s population that is always connected, on the go, everywhere, with their work and private lives in their pockets and handbags. But mobility has side effects… The cracked display is a common sight these days.
By Israel Lifshitz, NuboLate last month, it was discovered that the security vulnerability Shellshock can be made wormable and grant hackers the ability to run arbitrary codes on Bash, the most widely-used command processor which serves as the default shell for Unix, Linux and Mac OS X. Read More >>>
IBM (NYSE: IBM) today released its predictions for the 2014 holiday shopping season based on billions of online and in-store transactions analyzed by the IBM Digital Analytics Benchmark and IBM Quarterly Retail Forecast.
As customer-focused executives, you understand all too well that success today is based on delivering great customer experiences. Increasingly, this means that you need next generation applications to support new processes, products/services and even business models. These applications aid a variety of functions, including serving customers across channels, assisting with sales and marketing operations, supporting customer communities, and enabling e-commerce and other digital services.
The Bring Your Own Device (BYOD) trend has been growing in a number of businesses for the past few years. Now, a different, yet related, trend has emerged—Bring Your Own Application (BYOA). BYOA allows employees to choose and use the software they believe helps them perform their jobs best and bring these programs into the office on their devices.
The workplace trend of BYOD (Bring Your Own Device) is nothing new. What remains unclear, however, is the burden of ownership, cost and security. When employees bring their own cell phones, laptops or tablets to work, there’s a fair chance they’ve personally purchased those devices—data plans and all. In fact, some employers today require a BYOD policy, with no intention of paying for any of it. As one CIO bluntly put it, “Well, we don’t buy their pants either, but they’re required for the office.”
Mendix, the enterprise app platform as a service (aPaaS) company, announced major enhancements to the Mendix App Platform, drastically reducing the time, cost and effort for companies to deliver multi-channel and mobile apps. With this new release, Mendix empowers both business users and developers to easily build cross-platform mobile apps that provide the rich, native experience enterprise users are clamoring for.
by Lisa Grady, Radiant LogicWhen customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security but also productivity and simplicity for your users. Read More >>>
Sophos today announced that it has acquired cloud-based security firm Mojave Networks of San Mateo, Calif. This acquisition will strengthen Sophos cloud-managed and appliance-based security solutions. To Sophos Cloud, an integrated cloud-managed security offering, Mojave will add a rich cloud-based web security solution. And to Sophos’ line of network security hardware it will enable hybrid deployment options (SaaS and non-SaaS) to meet diverse web security needs.
How CIOs can handle the disruption caused by increased innovation in the enterprise. Ten years ago, mobile consisted of email, voice and SMS. Any innovation was very much behind the firewall, in a closed environment. If new developments were needed, resources would have to be allocated and as a result, any CIO would have to be very sure of a return on the investment before innovation projects could go ahead.
While many approaches are being used to control the impact of the mobile age on IT, VMI technology shows your organization can both embrace and thrive in this new world.
Download this white paper and read how IT needs a transformation to a more user-centric, mobile-aware and agile model, and the best-of-breed architecture the cloud affords is key to unlocking this next evolution of enterprise technology.
with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>
with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>
with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>
By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>
In this interview, Zaheeruddin Ahmed B, marketing analyst at Site24x7, a ManageEngine cloud service, discusses the need for a way to monitor mobile apps and mobile-optimized websites — from the perspective of the mobile user — and his company’s efforts to do just that with its industry-first mobile monitoring solution.