Get the ECT News Network Editor's Pick Newsletter » View Sample | Subscribe
Welcome Guest | Sign In
Preventing a BYOD Free-for-All
November 19, 2012
The growing acceptance of bring-your-own-device use in the enterprise comes with promise and perils. Allowing users to own and maintain and work on computing and mobile devices of their choosing is starting to make sense for more organizations. The experiences of one company, Quest Software, which has begun supporting BYOD with the full blessing of IT, serve as an example.
Office on iOS, Android Could Spread MS' Enterprise Roots
November 7, 2012
Microsoft reportedly will release Office Mobile for devices running iOS and Android next year. The software will released in the form of free apps, for iOS first, in early February or late March. The Android version is scheduled for May. Office Mobile was first released to users of Windows Mobile 6.5 in 2010, and is available on Windows Phone 8.
Secure User Authentication: Might Makes Right
October 13, 2012
While the benefits of adopting Bring Your Own Device as your mobile policy are appealing -- from increased productivity to lower costs -- a BYOD policy can also leave your corporate network more vulnerable than ever. The breaches regularly featured in the news remind us that all networks, no matter how large or small, risk being exposed to unauthorized users every day.
Mobile Security: A Moving Target
October 2, 2012
The threat to enterprise security is increasing as the BYOD phenomenon gains ground in corporate America. The amount of Android malware out there has gone through the roof, and hackers are leveraging Twitter to create command and control servers for mobile botnets, according to McAfee's Q2, 2012 threats report. Existing approaches to security don't work well, and new solutions are required.
How Mobile Can Help CRM Get Past Its Adoption Issues
August 23, 2012
If Winston Churchill had been a CRM pundit, he may have penned the immortal turn of phrase, "never in the course of human events have so many paid so much to have so few use an application." That would have made him a pretty awful CRM writer. But give fictional Winston a break -- it is difficult to summarize the ongoing struggle with user adoption in a concise way.
The Cloud: It's Not Just a Technology - It's a Catalyst
August 13, 2012
"The word 'cloud' gets thrown around a lot, but when I drill into the topic, I find that customers are really talking about services and integrating different services, whether they are on-premises, in the public cloud arena, or even that gray land, which is called 'outsourcing,'" said HP's Paul Muller.
The Evolution of IT: BYOD and Consumerization
July 25, 2012
The BYOD, movement is a reality for most IT departments today. And it's generally accepted that it was spearheaded by the tremendous popularity of Apple consumer devices -- primarily iOS devices such as iPads and iPhones. Based on the Apple model, users are encouraged to purchase additional devices -- and they expect to use them in all aspects of their life, including professionally.
Avaya Beefs Up BYOD Support in Unified Communications
July 19, 2012
New mobility and security features are among the areas of focus in Avaya's latest iteration of Avaya IP Office 8.1, its unified communications platform for small and mid-sized enterprises. The company also built out the scale of the application; it is now able to serve 1,000 users in a single location, up from its previous support level of 384.
Cisco Systems Stumbles in the Cloud
July 13, 2012
In the stampede of established players and relative startups seeking to capture a piece of the rapidly expanding cloud market, it is inevitable there will be a few casualties. However, it is surprising which companies have failed to gain an edge in this "Cloud Rush" environment. A case in point is Cisco Systems, which can't seem to find its way in this brave new world of the cloud.
Samsung Makes Android SAFE for IT
June 19, 2012
Samsung's forthcoming Galaxy S III smartphone will be the company's first device to be officially branded and sold under its new SAFE program. SAFE stands for "Samsung Approved for Enterprise." The Galaxy S III will be available in the U.S. from Verizon Wireless, AT&T, Sprint, T-Mobile and U.S. Cellular in July.
Remodeling Corporate Culture for the Digital Era
June 16, 2012
While the Millennial generation drives the latest trends in technology, it's worth remembering that it was the Baby Boomers who put the "e" in email, e-learning and e-commerce. The foundations of the Digital Era that forever changed the way we work, shop, learn and play were built by innovators born from the mid-1940s through the 1950s.
The BYOD Maelstrom: Legal, Technical Issues Abound
June 13, 2012
When companies started issuing BlackBerry phones, the world changed. With the advent of the iPhone and Android, the world changed again. Employees started using the newer, hotter technologies, and many carried the company BlackBerry and the iPhone or an Android handset but did not like carrying one device for work and one for personal stuff.
5 Tips for Braving the BYOD Boom
June 8, 2012
On today's information technology landscape, one thing is glaringly obvious: Security concerns associated with employees bringing personal devices onto the corporate network -- both internal and external -- are keeping IT managers up at night. The "consumerization" of IT is having an enormous impact on IT security.
Windows to Throw Smartphone Market Wide Open
June 7, 2012
The worldwide mobile phone market will grow slightly more than 4 percent in 2012 -- the smallest year-over-year increase since 2009, according to IDC. The decline is attributed to a slowdown in feature phone shipments, which are projected to drop by 10 percent, and a lackluster global economy.
Encryption on the Go, Part 2
June 6, 2012
The growing consumerization of IT is turning into a security nightmare for many IT departments, but it's perhaps hitting the healthcare industry worst. "BYOD is an emerging issue in healthcare, as staff bring their latest and greatest devices and ask to use them in their work," said Christina Thielst, vice president at Tower Strategies.
RIM Searches for Saving Grace
May 30, 2012
For some time, the future of Research In Motion has been questionable, to say the least. Now, President and CEO Thorsten Heins has cast more doubt on the company's prospects with the announcement that RIM is likely to post its first operating loss in eight years.
Encryption on the Go, Part 1
May 30, 2012
The growth of the bring-your-own-device trend, in which employees use their personal devices in the workplace, is proving to be a huge headache for IT. Often underfunded, understaffed and overworked, IT now has to cope with a plethora of different devices running different operating systems -- or different versions of an operating system.
The Lighter Side of IT Consumerization
April 24, 2012
You've probably heard the term "consumerization of IT." Some of the network and security pros reading this probably think this is yet another meaningless industry buzzword with little or no value. However, to dismiss it as such is to potentially miss out on what is both a very powerful concept ... and one that information security practitioners ignore at their peril.
Meeting the Productivity Challenge in a Consumerized IT World
January 31, 2012
Employees are growing more comfortable working from their own devices, particularly with the increasing adoption of portable technologies like the tablet computer. They are also accustomed to self-service delivery of applications in their personal lives, with almost instant access to apps and new services. IT managers need to learn how to get a handle on these devices rather than fight a losing battle with regulation.
When B2C and B2B Worlds Collide
January 20, 2012
Having spent more than 20 years in the tech industry, I've seen many trends (and related buzzwords) come and go. One trend that I continue to see each year is the "consumerization of IT." While it hasn't always been referred to by that label, consumer demand has manifest itself across a variety of sectors in the industry, from PCs and email to the cloud.
Effective Retail Mobilization: New Rules
January 6, 2012
Over the past year, we have seen many retailers making the switch to in-store mobility. Retailers such as Sears, Home Depot, Urban Outfitters and Nordstrom are not only equipping their staff with mobile devices -- they're handing them to customers as well, to help make shopping more efficient and convenient for all parties involved.
BYOD and IT: The Tail Wagging the Dog?
December 9, 2011
There was perhaps no hotter topic in 2011 than the consumerization of IT, and for good reason. The rise of personal technology -- smartphones, tablets, storage devices and cloud services -- has forced the hand of IT departments across every industry sector, from SMB to enterprise.
Igniting the Mac-at-Work Revolution
July 15, 2011
In so many words, Steve Jobs recently discussed the tremendous opportunity ahead for Mac in the enterprise. With the introduction of iCloud, Apple's new service for seamlessly integrating content across devices, the company appears to be headed down the right path. Consider the fact that organizations offering their workers a choice of platform -- PC or Mac -- stand to gain a significant competitive advantage.
Easing the Throb of Mobile Security Headaches
April 2, 2011
There is no denying that mobile devices like tablets are changing the way we communicate, work and share information on the go -- it's the next logical step in the "post-PC" world. In addition to an increase in cloud-based services, there is a surge in multiple mobile devices -- with consumers not only using several at one time, but also switching between them throughout the day.
See More Articles in BYOD Section >>
Ideoclick eBook
What was your initial reaction to news of the Colonial Pipeline cyberattack?
It demonstrates that all critical infrastructure sectors are at high risk of disruption by cybercriminals.
Everyone will be paying for this attack in the form of higher energy costs.
Governments need to work more closely with private industries to protect networks for the sake of public safety.
It's a global problem. An international alliance must be formed to hold the perpetrators accountable and prevent future attacks.
Ekata Pro Insight Identity Review