Most Recent Blogs

Beyond Basic Mobile Management

Posted: August 08, 2012   /   By: Jon Oltsik   /   Tags: End-User Computing, Endpoint & Application Virtualization, Information and Risk Management, Enterprise Software, mobile, Security and Privacy, android, MobileIron, Zenprise, iPad, Good Technologies

In 2010, ESG Research asked 174 enterprise IT professionals whether their organizations were developing or planned to develop their own mobile applications. The findings were as follows:

Read More

A Multitude of Mobile Security Issues

Posted: July 20, 2012   /   By: Jon Oltsik   /   Tags: Apple, Microsoft, End-User Computing, Check Point, MDM, Cisco, Information and Risk Management, McAfee, mobile, Security and Privacy, google, BYOD, android, Good Technology, Juniper Networks, Black Hat, trend micro, Symantec, Anti-malware, Interop, MobileIron, DLP, RSA Security Conference, iPad

The Black Hat USA conference takes place next week. If it's anything like RSA and Interop, there will be a fair amount of discussion about BYOD and mobile device security. Yup, a lot of hype but this is a topic worth discussing as nearly every enterprise organization and CISO I speak with is struggling here.

Read More

BYOD Security Gotchas

Posted: May 30, 2012   /   By: Jon Oltsik   /   Tags: Cisco, Information and Risk Management, Security and Privacy, Security, BYOD, endpoint security, android, Juniper Networks, NAC, mobile device, CISO, Extreme Networks, iPad, Enterasys

I've spent a fair amount of time lately on BYOD (Bring Your Own Device), mobile devices, and related issues around information/cyber security. Yes, we are still firmly in the hype cycle but some mobile device security patterns are starting to emerge.

Read More

Document-based Security Standards: The Time is Now

Posted: April 13, 2012   /   By: Jon Oltsik   /   Tags: Microsoft, Check Point, Information and Risk Management, McAfee, Enterprise Software, Security and Privacy, android, Content Management, trend micro, Search, Symantec, RSA, NIST, DLP, iPad, Archiving, Windows

I first heard the term de-perimeterization years ago from my friends at the Jericho Forum, a UK-based organization of security professionals. Back then the focus was on securing IT when it crossed organizational boundaries. In other words, a highly-secure network perimeter offers little protection if my business applications, services, and sensitive data are consumed by users working at other organizations, with different security policies and controls, residing outside the firewall.

Read More

The Evolution of Endpoint Security

Posted: February 15, 2012   /   By: Jon Oltsik   /   Tags: Check Point, Information and Risk Management, McAfee, Security and Privacy, Security, malware, endpoint security, Kaspersky, android, trend micro, Symantec, Firewall, IDS/IPS, APT, iPad

Back in 2007, ESG asked 206 IT enterprise security professionals to respond to the following statement: Endpoint security has become a commodity market with little difference between products. A majority (58%) of respondents either "strongly agreed" or "agreed" with this statement.

Read More

Posts by Topic

see all