Talking Mobility (ESG 360 Video Series)

Here, Mark Bowker starts his discussion of IT mobility by defining it broadly--but-clearly--as the secure delivery of apps and data wherever and however needed. This major practical change in IT is conceptually simple to grasp but brings multiple complex challenges for IT organizations - not least of which is the dual threat of unpredictability and associated [potential for] lack of control. Mark explains that the major foci for IT around mobility are therefore security, policy, and management structures - but that isn’t to say that there is not also a major, gratifying pay-off for IT organizations that get mobility done well...

Topics: Enterprise Mobility ESG 360 Video Series

Where Endpoint Management and Security Meet

Upgrade existing tools or net new platform investments?

This is the question IT operations and information security teams are wrestling with as they attempt to secure an expanding perimeter driven by cloud, mobile, and IoT. Should companies maintain a traditional siloed tool approach or embrace a modern management approach that unifies management and security policies across users, devices, applications, networks, and data?
Topics: Cybersecurity Enterprise Mobility

Modern Device Management: Resist Or Embrace?

Here’s the problem. Gone are the days where a user would have a single username and password to access a single device. And gone are the times when IT had to secure a single predictable and stable environment. Bye bye. Today as we know, employees have multiple devices that they use every day to get work done.  For example it is not unusual to see an employee with a Samsung phone running Android, an iPad running iOS and a Windows laptop….let’s throw in a Chromebook for fun too. These are all fantastic pieces of technology and do in fact have employee satisfaction and productivity gains that should not be ignored. But how does IT wrap their arms around all these devices, applications, and identities….not to mention securing the now expanded perimeter. Yikes!

Topics: Enterprise Mobility

Thinking about Identity Management for the RSA Security Conference

With February behind us, the cybersecurity industry is about to experience a push toward the annual RSA Security Conference in San Francisco. I expect around 50,000 people to attend this year. It ought to be crowded, loud, and extremely passionate.

Topics: Cloud Computing Cybersecurity IAM Enterprise Mobility

2018 Enterprise Mobility Spending Trends Video

As part of ESG’s 2018 IT spending intentions research, IT decision makers were asked about their spending plans for enterprise mobility technology over the next 12 months. In this video, you'll learn about where enterprises are focusing their mobility spending, spending priorities, and changes in spending.

Topics: Enterprise Mobility

2018 Goodbye Password....Hello Bots and Machine Learning

2018-mobility-predictions.jpgBusinesses can no longer compromise security for user experience and should look to strengthen security while improving productivity. Doug Cahill and I share our insights into how companies have the opportunity to improve their security posture while embracing mobility.

Topics: Cybersecurity machine learning Enterprise Mobility 2018 Predictions

Say Goodbye to Passwords in 2018

Passwords. They’ve always been an ongoing IT issue, but that subject is becoming exceptionally serious as organizations strive to support a rapidly growing mobile workforce using ever-increasing numbers of devices, and consuming more and more applications from external cloud platforms. Passwords are:

  • Easily forgotten and easy to guess.
  • Used across multiple devices and locations resulting in an expanded attack surface.
  • A significant expense and drain on IT resources.
  • Difficult to enter on mobile devices.
Topics: Cybersecurity Enterprise Mobility

ESG360 Video: Who Owns Identity and Access Management (IAM)?

Mobility and cybersecurity. While those two areas may have very different roles inside an IT organization and business, they both play integral parts in identity and access management. Given that, I’m always getting asked, “Who owns IAM?”

Topics: Cybersecurity identity and access management Enterprise Mobility

Why Companies Need to Protect Their Employees’ Corporate Identities (Video)

More and more people are proactively protecting their personal identities. But it’s not only individuals that must take steps to keep their identities safe. Companies must also be vigilant about protecting corporate identities. Between fraud and identity theft, and bad actors committing nefarious acts while impersonating a company’s CEO, the integrity of a company can easily be compromised.

Topics: Cybersecurity Enterprise Mobility

Who Owns Identity and Access Management (IAM)? (Video)

When it comes to identity and access management (IAM), the cloud, mobility initiatives, and app dev are driving chaos. Security risks are on the rise due to the expanded perimeter, and though IT operations shoulders a great deal of IAM responsibility, who actually owns identity and access management?

The answer isn’t clear-cut. It actually depends on a number of things, including: an organization’s maturity, its security posture, and how aggressively the company is pursuing identity and access management strategies.

Topics: identity and access management Enterprise Mobility