Most Recent Blogs

Managing IT Risk Associated with Mobile Computing Security

Posted: April 08, 2014   /   By: Jon Oltsik   /   Tags: IBM, End-User Computing, Check Point, Fortinet, Cisco, Information and Risk Management, mobile, Security and Privacy, Security, BYOD, Citrix, data security, Fiberlink, android, Dropbox, Good Technology, Airwatch, Blue Coat, CISO, Bit9, Anti-malware, Facebook

When BYOD was coming to fruition a few years ago, it had a sudden and deep impact on IT risk. Why? Many CISOs I spoke with at the time said it was purely a matter of scale. All of a sudden, large enterprises had thousands of additional devices on their networks and they struggled to figure out what these devices were doing and how these activities impacted organizational risk.

Read More

Hot Topics at the RSA Conference

Posted: February 20, 2014   /   By: Jon Oltsik   /   Tags: Cloud Computing, Check Point, Fortinet, Cisco, Networking, Information and Risk Management, FireEye, mobile, Security and Privacy, endpoint security, SIEM, Cybereason, Good Technology, bromium, 21CT, CloudPassage, Firewall, Cylance, click security, Bit9, Carbon Black, IDS/IPS, Firewall & UTM, Hexis Cyber Solutions, Public Cloud Service

It’s the calm before the storm and I’m not talking about the unusual winter weather. Just a few days before the 2014 RSA Security Conference at the Moscone Center in San Francisco.

In spite of this year’s controversy over the relationship between the NSA and RSA Security (the company), I expect a tremendous turnout that will likely shatter the attendance records of last year. Cybersecurity issues are just too big to ignore so there will likely be a fair number of first-time attendees.

Read More

Enterprise Security Professionals Identify Mobile Computing Security Challenges

Posted: February 12, 2014   /   By: Jon Oltsik   /   Tags: IBM, Cybersecurity, MDM, Information and Risk Management, mobile, Security and Privacy, Security, cybersecurity skills shortage, endpoint security, Citrix, CyberArk, Courion, Bradford Networks, Fiberlink, android, Good Technology, ForeScout, Airwatch, Blue Coat

Most companies now provide network access and application support for non-PC devices like smartphones and tablets and many are developing new applications and business processes designed specifically for these devices. Business managers look at iPhones, Android devices, and even Windows phones and see opportunities for revenue growth, cost cutting, and improved communication everywhere.

Read More

A Few Reasons Why VMware bought AirWatch

Posted: January 24, 2014   /   By: Jon Oltsik   /   Tags: IBM, Cloud Computing, MDM, VMware, Information and Risk Management, mobile, Security and Privacy, Security, Citrix, Mobile computing, Fiberlink, Good Technology, Virtualization, Airwatch, MobileIron, wireless, Zenprise

It’s still early but 2014 is shaping up to be highlighted by M&A activity. The VMware/AirWatch marriage is the latest example.

So why was VMware willing to spend $1.5+ billion for an MDM leader? The easy answer is that the world is going mobile – new application development is focused on mobile or web applications alone while PCs are moving closer to mainframe status. AirWatch immediately bolsters VMware’s play for endpoint computing as well with mobile complementing virtual desktop technology.

Read More

What I’m Learning about Mobile Computing Security Best Practices

Posted: April 18, 2013   /   By: Jon Oltsik   /   Tags: End-User Computing, MDM, Information and Risk Management, mobile, Security and Privacy, Security, endpoint security, Good Technology, MobileIron, Zenprise, mobile security

When I started my career at EMC in 1987, the company ran the business on Prime Computers. I was able to convince my boss that I could improve the quality and efficiency of our group’s business reports with a PC, so the company purchased a Macintosh computer and printer for me to use. This may have made me the first PC user in EMC history, though I can’t be sure.

I’ve had PCs at every job since, but it wasn’t until the mid-to-late 1990s that any of these machines had any security software installed on them. In fact, I think it was the rise of spyware that drove the deployment of security software somewhere around 1999.

Read More

A Multitude of Mobile Security Issues

Posted: July 20, 2012   /   By: Jon Oltsik   /   Tags: Apple, Microsoft, End-User Computing, Check Point, MDM, Cisco, Information and Risk Management, McAfee, mobile, Security and Privacy, google, BYOD, android, Good Technology, Juniper Networks, Black Hat, trend micro, Symantec, Anti-malware, Interop, MobileIron, DLP, RSA Security Conference, iPad

The Black Hat USA conference takes place next week. If it's anything like RSA and Interop, there will be a fair amount of discussion about BYOD and mobile device security. Yup, a lot of hype but this is a topic worth discussing as nearly every enterprise organization and CISO I speak with is struggling here.

Read More

Posts by Topic

see all