It’s the question every IT manager is asking. The short answer: there’s not a single consumer mobile operating system that offers all of the security and management capabilities that enterprises need—but they are getting better. To get a complete picture of current mobile OS security holes and management challenges, I strongly recommend reading a timely…
Read MoreAs a result of the increase in consumer-grade sync and sharing solutions being used within business, a huge black hole has been created when it comes to protecting and controlling corporate data. The enterprise can take a blanket view and block the access and synchronization of these solutions with gateway technology, or even completely lock…
Read MoreTalking regularly* about the consumerization of IT can often make one sound like a broken record, but the economic, security and management challenges it throws up for enterprises are too important to ignore. The problems boil down to a lack of control, which can be described in two key ways. IT departments of course are…
Read MoreNelson Pereyra of bnetTV.com interviews Cesare Garlati at the Showstoppers 2012 event during the Mobile World Congress in Barcelona. Consumerization, BYOD and Mobile Security. Nelson Pereyra: Hello, I’m Nelson Pereyra from bnetTV. Welcome to Showstopper 2012 in Barcelona. And with us is Cesare Garlati, Senior Director of Mobile Security at Trend Micro. How are you…
Read MoreDo you feel like BYOD introduces more IT challenges than…uh… the total number of Android apps on the market today? Well, first let me assure you, there are not that many challenges. But they can be complex. So where do you begin? This IDC white paper is a great starting point that can help you…
Read MoreConsumerization is happening now, but many IT departments simply aren’t prepared to deal with the new challenges and complexities it entails. With IT managers increasingly urged by CEOs to stop saying ‘no’ and start supporting consumer tools, they need to reappraise their traditional approach. Put simply, IT needs flexible standards – they can’t say no…
Read MoreBy Vic Hargrave Apple rigorously scrutinizes applications before publishing them on its AppStore site, often rejecting apps that violate the company’s security and usability policies. Given this practice, it’s easy to assume that iOS mobile devices (iPhones, iPads, iTouch) are more secure than their Android counterparts. But there’s more to this story. Veracode, maker of application…
Read MoreMany employees don’t understand the implications of using their personal devices for work. Many companies don’t understand that they are in fact liable for the consequences. This post covers the things you always wanted to know about BYOD but were too afraid to ask. Good News: Your company offers a BYOD program. You can finally…
Read MoreLearn from a panel of industry peers the solutions and the best practices that have turned consumer mobile technology into a competitive advantage for their companies. This is Part Two of the post based on the panel that I moderated at the IDC mobileNext Forum 2011 in San Francisco. Click here for Part One. Eric…
Read MoreLearn from a panel of industry peers the solutions and the best practices that have turned consumer mobile technology into a competitive advantage for their companies. This post is based on the recording of the panel that I moderated at the IDC mobileNext Forum in December 2011 in San Francisco. Eric Erickson VP Information Systems…
Read More