Information Security: The Most Important IT Initiative in 2015

At an elementary level, IT is all about using technology to enable the business. This really hasn’t changed, even back in the early days when IT was called data processing or management information systems. 

In today’s IT world, business enablement is driving a few meta-trends. Cheap hardware and open source software are driving big data analytics to the mainstream. Organizations are abandoning the costs and constraints of on-site IT systems as they move applications and systems to the cloud. Mobile devices are becoming the primary compute platform for users, automating business processes and changing application development.

Topics: Cloud Computing Mobile computing Big Data Analytics cloud security mobile security

What I’m Learning about Mobile Computing Security Best Practices

When I started my career at EMC in 1987, the company ran the business on Prime Computers. I was able to convince my boss that I could improve the quality and efficiency of our group’s business reports with a PC, so the company purchased a Macintosh computer and printer for me to use. This may have made me the first PC user in EMC history, though I can’t be sure.

I’ve had PCs at every job since, but it wasn’t until the mid-to-late 1990s that any of these machines had any security software installed on them. In fact, I think it was the rise of spyware that drove the deployment of security software somewhere around 1999.

Topics: End-User Computing MDM Information and Risk Management mobile Security and Privacy Security endpoint security Good Technology MobileIron Zenprise mobile security

Endpoint Security: The Next Generation

When you mention endpoint security in conversation, it's not unusual to get some type of visceral response - eyes rolling, sighs, etc. Security professionals and the industry at large think of endpoint security as a commodity or "necessary evil." Some of my fellow analysts have gone so far to say that endpoint security as a category is dead (that's an old analyst trick for declaring that you've come up with some new model).

Topics: IBM Check Point Cisco Information and Risk Management Juniper FireEye McAfee Security and Privacy endpoint security Kaspersky Lab trend micro Symantec Webroot antivirus Sophos Damballa NIST Good Technologies mobile security