Most Recent Blogs

A Few Reasons Why VMware bought AirWatch

Posted: January 24, 2014   /   By: Jon Oltsik   /   Tags: IBM, Cloud Computing, MDM, VMware, Information and Risk Management, mobile, Security and Privacy, Security, Citrix, Mobile computing, Fiberlink, Good Technology, Virtualization, Airwatch, MobileIron, wireless, Zenprise

It’s still early but 2014 is shaping up to be highlighted by M&A activity. The VMware/AirWatch marriage is the latest example.

So why was VMware willing to spend $1.5+ billion for an MDM leader? The easy answer is that the world is going mobile – new application development is focused on mobile or web applications alone while PCs are moving closer to mainframe status. AirWatch immediately bolsters VMware’s play for endpoint computing as well with mobile complementing virtual desktop technology.

Read More

What I’m Learning about Mobile Computing Security Best Practices

Posted: April 18, 2013   /   By: Jon Oltsik   /   Tags: End-User Computing, MDM, Information and Risk Management, mobile, Security and Privacy, Security, endpoint security, Good Technology, MobileIron, Zenprise, mobile security

When I started my career at EMC in 1987, the company ran the business on Prime Computers. I was able to convince my boss that I could improve the quality and efficiency of our group’s business reports with a PC, so the company purchased a Macintosh computer and printer for me to use. This may have made me the first PC user in EMC history, though I can’t be sure.

I’ve had PCs at every job since, but it wasn’t until the mid-to-late 1990s that any of these machines had any security software installed on them. In fact, I think it was the rise of spyware that drove the deployment of security software somewhere around 1999.

Read More

Beyond Basic Mobile Management

Posted: August 08, 2012   /   By: Jon Oltsik   /   Tags: End-User Computing, Endpoint & Application Virtualization, Information and Risk Management, Enterprise Software, mobile, Security and Privacy, android, MobileIron, Zenprise, iPad, Good Technologies

In 2010, ESG Research asked 174 enterprise IT professionals whether their organizations were developing or planned to develop their own mobile applications. The findings were as follows:

Read More

A Multitude of Mobile Security Issues

Posted: July 20, 2012   /   By: Jon Oltsik   /   Tags: Apple, Microsoft, End-User Computing, Check Point, MDM, Cisco, Information and Risk Management, McAfee, mobile, Security and Privacy, google, BYOD, android, Good Technology, Juniper Networks, Black Hat, trend micro, Symantec, Anti-malware, Interop, MobileIron, DLP, RSA Security Conference, iPad

The Black Hat USA conference takes place next week. If it's anything like RSA and Interop, there will be a fair amount of discussion about BYOD and mobile device security. Yup, a lot of hype but this is a topic worth discussing as nearly every enterprise organization and CISO I speak with is struggling here.

Read More

Posts by Topic

see all