Enterprise Mobility at Citrix Synergy

Last week, ESG Senior Analyst Terri McClure and I were at Citrix's Synergy event in Orlando to see the developments and announcements on enterprise mobility. Both of us were active on Twitter throughout the event, so our best recap comes by way of Storify:

Topics: Mobile computing Enterprise Mobility

The Increasing Cybersecurity Attack Surface

I just read a good Wall Street Journal blog by Ben DiPietro titled, Speed of Tech Change a Threat to Cybersecurity. His main point is that while organizations are adopting new technologies like cloud computing, mobile computing, and applications based upon the Internet of Things (IoT), they continue to address cybersecurity risks, controls, and oversight with legacy tools and processes. This creates a mismatch where cyber-adversaries have a distinct offensive advantage over a potpourri of assorted legacy enterprise security defenses.

Topics: Cloud Computing Cybersecurity IoT Mobile computing cyber attack cyber crime

Information Security: The Most Important IT Initiative in 2015

At an elementary level, IT is all about using technology to enable the business. This really hasn’t changed, even back in the early days when IT was called data processing or management information systems. 

In today’s IT world, business enablement is driving a few meta-trends. Cheap hardware and open source software are driving big data analytics to the mainstream. Organizations are abandoning the costs and constraints of on-site IT systems as they move applications and systems to the cloud. Mobile devices are becoming the primary compute platform for users, automating business processes and changing application development.

Topics: Cloud Computing Mobile computing Big Data Analytics cloud security mobile security

Holistic IT Platforms Driving IT Transformation

There is a tremendous amount of evidence that enterprises are transforming their IT environments to better support the business. Consolidated datacenters, virtualization technologies, cloud adoption, and mobile computing are on the rise and fueling the shift. Core to this transformational process is ensuring that all business applications are highly available, optimized for performance, and accessible to anyone from anywhere.

Topics: Cloud Computing Storage IT Infrastructure cloud Networking Compute Mobile computing Virtualization

Has Mobile Computing Had a Positive Impact on Cybersecurity?

I’ve heard the same story from a multitude of CISOs: “As soon as we agreed to support BYOD and mobile devices, all hell broke loose!” How? All of a sudden there were hundreds or thousands of new devices accessing the corporate network. Many of these devices were employee-owned, unmanaged, and full of questionable applications. What’s more, users were now working on multiple devices and moving sensitive data between Windows PCs, iPads, Android phones, and a slew of online file sharing sites like Box, Dropbox, and iCloud. Holy threat and vulnerability, Batman!

Most enterprise organizations are now way past this early period of mobile security chaos. Yes, there are still plenty of challenges associated with mobile computing security, but did preliminary mobile computing anarchy have any positive impact on information security in the long run? In other words, did the initial mobile computing fire drills actually help CISOs recognize risks and address systemic weaknesses?

Topics: IBM MDM Cisco Information and Risk Management Juniper HP mobile Security and Privacy Security endpoint security Bradford Networks Mobile computing Box Dropbox Aruba Vormetric ForeScout Veracode Great Bay Software NAC

A Few Reasons Why VMware bought AirWatch

It’s still early but 2014 is shaping up to be highlighted by M&A activity. The VMware/AirWatch marriage is the latest example.

So why was VMware willing to spend $1.5+ billion for an MDM leader? The easy answer is that the world is going mobile – new application development is focused on mobile or web applications alone while PCs are moving closer to mainframe status. AirWatch immediately bolsters VMware’s play for endpoint computing as well with mobile complementing virtual desktop technology.

Topics: IBM Cloud Computing MDM VMware Information and Risk Management mobile Security and Privacy Security Citrix Mobile computing Fiberlink Good Technology Virtualization Airwatch MobileIron wireless Zenprise