BYOD

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Fusce augue justo, viverra at luctus vitae, dapibus eu odio. Morbi vestibulum orci neque, vulputate pharetra purus fringilla in.

Control the Rise in Shadow IT Post-Christmas
Control the Rise in Shadow IT Post-Christmas

Millions of new devices have been bought and activated over the holidays. We saw that 2015 Black Friday sales showed some of the highest increases in new device activations for the iPad mini and a number of smartphones, with Apple product activations topping those in 2014. With Christmas now behind us, we’ll see an even larger spike in new device activations for all the tablet, smartphone and laptops gifted...

READ MORE
Predictions for Data on the Endpoint in 2016
Predictions for Data on the Endpoint in 2016

We recently took a look back at our Predictions for Mobile in 2015, looking at how our predictions panned out for the year. Overall, we saw a marked shift toward understanding the complexities of how people and endpoint devices put data at risk. As a new year approaches, we expect that organizations will continue to face data security challenges with the endpoint as one of the greatest threats to...

READ MORE
A Look Back at Predictions for Mobile in 2015
A Look Back at Predictions for Mobile in 2015

For the past several years, we have created Predictions for Mobile for the year ahead. Before we look forward to 2016, let’s first look back at 2015 and see where we stand. In late 2014, our Predictions for Mobile in 2015 projected a shifting perception of the need for data-based security, which indeed has intensified throughout the year with added pressures and risks now associated with endpoint devices.

READ MORE
BYOD Still Remains Unchecked
BYOD Still Remains Unchecked

One of the largest data security risks for most organizations continues to be mobile devices. Each employee may have 3 or 4 endpoint devices - smartphones, tablets, laptops - which are connecting to the corporate network or contain sensitive data. Many of these devices are personally-owned, and whether supported by an official BYOD policy or not, these devices are increasing the potential points of ingress for cyber criminals. Given...

READ MORE
Shadow IT: A Growing Threat You Can't Ignore
Shadow IT: A Growing Threat You Can't Ignore

Shadow IT, the use of technology systems and solutions without the explicit approval of the organization, can no longer be swept under the table and ignored. Nor should it be applauded, for while employees are showing initiative in embracing apps and technologies to improve their productivity, they do so by putting corporate data at risk. Shadow IT is happening right now in your organization, you just don’t know it....

READ MORE