Big Data is talking. Are you listening?
Mobile devices are not just another type of endpoint. Inherent features (e.g., camera, accelerometer, proximity sensor, etc.) coupled with the always-connected, readily available nature of these devices represent an opportunity for improvement in enterprise user productivity. Enterprises can begin to realize this potential by allowing use of corporate data in both custom-built and commercially available mobile apps. Mobile workflows resulting from interactions between these apps can be faster and more intuitive than those on a PC. However, the need to always retain control over corporate data should give an enterprise pause before sanctioning the widespread use of sensitive business information on mobile devices. Download whitepaper »
Face it. Modern workers are addicted to mobile devices. Not just any vanilla corporate-issued devices, but our carefully selected and personalized expressions of ourselves: iPads®, iPhones®, Androids™ and whatever-comes-next. Many of us get to use our devices in the office. According to Gartner, “IT leaders have a positive view of BYOD”1, implying that this is now a mainstream model. In supporting employee devices, companies tend to exert either very little control, or a stifling amount of control. The approach taken depends on which community has the upper hand: the employees or IT. Download whitepaper »
The explosion of smartphones and tablets in the workplace means that confidential information is now not only spread throughout your organization on servers and desktops, it is also being stored on mobile devices – which are prone to loss or theft – and being transmitted from these mobile devices beyond the control of your organization. It is easy for employees to disseminate – whether accidentally or intentionally – sensitive business data outside the organization with a simple action – e.g., upload employee healthcare records to the public cloud via a cloud storage app. Download whitepaper »
Magento e-commerce hosting provider MageMojo needed to improve security after a series of distributed denial-of-service (DDoS) attacks that took its site offline on Cyber Monday. Consolidating its DDoS mitigation and firewall needs in a high-performance F5 solution, MageMojo strengthened both its security posture and its business.
- Opera Mini becomes default browser for Microsoft's fading feature phones
- Uber builds on being 'best' by linking its ride requests to other mobile apps
- Citrix software aims to solve storage/virtual desktop performance problem
- Should companies practice data retention or data destruction?
- LTE in Wi-Fi spectrum shows great potential, says NTT DoCoMo
- Sony serves up tennis swing-analyzing sensor in US, Canada
- Small businesses seek to take off with the cloud
- Acer releases its own Chromebox, bringing the Google OS to desktops
- As sales deadline approaches, OEMs continue to push Windows 7 PCs to consumers
- LG's high-end smartphone features trickle down to new L series
- Symantec opens $12m Sydney office
- Amazon strikes deal in China to offer more imported goods
- Retired US airport body scanners fail to spot guns, knives
- Data#3 revenue rises to $833.5m
- Turnbull earmarks 3.5GHz band for NBN fixed wireless