Top three security concerns for CSOs and CIOs
The breakneck speed of technology evolution, the ever changing threat landscape, and the increasing flexibility, ingenuity and persistence of cyber attackers have made …
Do mobile devices in the workplace create security problems?
The role of IT managers has changed drastically in a short period of time – revolutionized by smart mobile devices and increased remote connection tools. While end users …
Avaya secures mobile collaboration and BYOD
Avaya Identity Engines 8.0 enables organizations to provide employees and guests with secure, controlled access to wired and wireless networks from their personal devices. …
Securing mobile apps in the enterprise
The mobile app has become the endpoint. With the advent of consumerization and BYOD, the number of managed devices began shrinking and that of unmanaged devices continues to …
ForeScout and Fiberlink fortify mobile security
ForeScout and Fiberlink announced a partnership to deliver an integrated MDM and NAC offering. The new product, ForeScout MDM powered by MaaS360, combines cloud-based mobile …
Identity as a Service platform for cloud service providers
Symplified announced Symplified Structure which enables telcos, cloud service providers, cloud application brokers, and cloud application hosting companies to seamlessly …
A basic shift in network defense
“In our industry, most of the companies we were working with have spent the the better part of the past ten years securing the perimeter of the network with intrusion …
Mobile security and identity management in the cloud
Executive-level security officers at some of the largest global companies have identified four main concerns for 2012: mobile device security, identity management for cloud …
Secure USB desktop environment for the enterprise
Imation announced the general availability of its ultra-secure StealthZONE PC-on-a-stick desktop environment to enterprise customers. Already used by national governments and …
Security monitoring for BYOD environments
Lancope showcased its solution for securing bring-your-own-device (BYOD) environments based on the company’s flow-based monitoring technology. Unlike other BYOD security …
BYOD is both an opportunity and a threat
A survey titled “What is your approach to BYOD – Love it? Hate it?” and conducted among 316 IT and security professionals set out to assess the opinions of …
Three BYOD problems that need to be solved
The Bring Your Own Device (BYOD) phenomenon has long stopped being just a fad and the option has become a crucial part of keeping employees and contractors happy and …