Beyond Basic Mobile Management

In 2010, ESG Research asked 174 enterprise IT professionals whether their organizations were developing or planned to develop their own mobile applications. The findings were as follows:

Topics: End-User Computing Endpoint & Application Virtualization Information and Risk Management Enterprise Software mobile Security and Privacy android MobileIron Zenprise iPad Good Technologies

A Multitude of Mobile Security Issues

The Black Hat USA conference takes place next week. If it's anything like RSA and Interop, there will be a fair amount of discussion about BYOD and mobile device security. Yup, a lot of hype but this is a topic worth discussing as nearly every enterprise organization and CISO I speak with is struggling here.

Topics: Apple Microsoft End-User Computing Check Point MDM Cisco Information and Risk Management McAfee mobile Security and Privacy google BYOD android Good Technology Juniper Networks Black Hat trend micro Symantec Anti-malware Interop MobileIron DLP RSA Security Conference iPad

BYOD Security Gotchas

I've spent a fair amount of time lately on BYOD (Bring Your Own Device), mobile devices, and related issues around information/cyber security. Yes, we are still firmly in the hype cycle but some mobile device security patterns are starting to emerge.

Topics: Cisco Information and Risk Management Security and Privacy Security BYOD endpoint security android Juniper Networks NAC mobile device CISO Extreme Networks iPad Enterasys

Document-based Security Standards: The Time is Now

I first heard the term de-perimeterization years ago from my friends at the Jericho Forum, a UK-based organization of security professionals. Back then the focus was on securing IT when it crossed organizational boundaries. In other words, a highly-secure network perimeter offers little protection if my business applications, services, and sensitive data are consumed by users working at other organizations, with different security policies and controls, residing outside the firewall.

Topics: Microsoft Check Point Information and Risk Management McAfee Enterprise Software Security and Privacy android Content Management trend micro Search Symantec RSA NIST DLP iPad Archiving Windows

The Evolution of Endpoint Security

Back in 2007, ESG asked 206 IT enterprise security professionals to respond to the following statement: Endpoint security has become a commodity market with little difference between products. A majority (58%) of respondents either "strongly agreed" or "agreed" with this statement.

Topics: Check Point Information and Risk Management McAfee Security and Privacy Security malware endpoint security Kaspersky android trend micro Symantec Firewall IDS/IPS APT iPad