You are here

Share
Posted by Yorgen Edholm
In a recent study of mobile workers, 93% reported that their productivity had increased because of mobile technology. However, most of the productivity increases resulted from traditional applications such as email, telephony, and remote desktop software, rather than from new mobile apps. For...
Posted by Vidhya Ranganathan
Recognizing the risk that BYOD security lapses pose for businesses and other organizations, the UK government has issued a sweeping collection of BYOD security recommendations. The recommendations include policy recommendations for management teams as well as OS-specific recommendations for IT...
Posted by Sara Day
Even after Apple’s stunning introduction of the Apple Watch, wearable technology is in its infancy. Mr. Cook’s team took a big step forward in terms of wearable application development, but it remains to be seen how consumer adoption will translate into more meaningful, life-critical...
Posted by Yorgen Edholm
A few days ago, we posted Part I of our 10 predictions for enterprise mobility in 2015. The suspense is over. Here’s Part II: Wearable Technology In 2015, wearables will find their way into the enterprise. It’s only a matter of time before these devices alter the way companies look at...
Posted by Yorgen Edholm
It’s December—time for looking back at the year just finished. 2014 was a big year for us at Accellion. We introduced our kiteworks platform and saw our secure mobile solutions adopted by leading enterprises in markets as diverse as healthcare, finance, retail, law, government, and...
Posted by Yorgen Edholm
More U.K. employees are using mobile devices for work, but many of these workers are careless about mobile security. This carelessness is creating new security risks, that attackers are exploiting, which is especially risky during the holidays when more workers than normal may be accessing content...
Posted by Yorgen Edholm
A new survey of IT professionals by Dimensional Research makes two things abundantly clear: The most important vulnerability in enterprise mobile security is employee behavior. 87% consider careless employees a greater threat than cybercriminals. “Employee actions have the highest impact on...
Posted by Paula Skokowski
The growth of mobile devices in the enterprise is well documented, but the critical concern now facing IT organizations is how to secure enterprise content on the shifting mix of mobile devices and platforms. The results from two recent surveys on mobile security indicate that while employees are...
Posted by Paula Skokowski
For several years, surveys by iPass and others have been reporting that mobile workers are carrying multiple mobile devices—three on average, according to a 2013 survey of mobile workers in the U.S. Now a new survey conducted by the Ponemon Institute finds that within 12 months nearly half...
Posted by Yorgen Edholm
We are at the start of a decade long mobile revolution in the enterprise software industry with applications being designed now with specific enterprise mobile use cases in mind. Smartphones and tablets have been on the market since 2007 and there are a tremendous number of consumer apps, but...
Posted by Paula Skokowski
Wearable technology is the new “it” thing. From FitBit, to Google Glass, to Samsung Galaxy Gear, and now the Apple iWatch, users are literally arming themselves with the latest gadgets. This is particularly true among early adopters who are counting the days until the release of the...
Posted by Vidhya Ranganathan
Remote wipe has become a fact of life for enterprise IT as more organizations adopt Bring Your Own Device (BYOD) policies and as more employees acquire a wide variety of smartphones and tablets. Mobile device management company Fiberlink Communications Corp. reported that it wiped 51,000 devices in...
Posted by Vidhya Ranganathan
Retailers love to earn the number one spot for holiday sales or profit margins, but lately some big names are holding a leading role that is considerably less desirable. Home Depot recently took the number one spot for the biggest data breach in retailing history when an estimated 56 million...
Posted by Yorgen Edholm
The mobile revolution, while firmly embedded in the consumer world, is now beginning to hit its stride in the enterprise world. This can be seen in the recent announcement from Apple and IBM , whose strategic alliance to develop joint solutions leveraging Apple devices and IBM software is an...
Posted by Paula Skokowski
The theft of celebrity photos from Apple iCloud is a stark reminder of the need to think twice before storing data. For many people using a Mac the default behavior is to automatically back up and save data to iCloud. It's wonderfully appealing and convenient and seamlessly integrates into...
Posted by Yorgen Edholm
The sight of trees turning golden red, and the sounds of grown men screaming at the TV can only mean one thing – its football season. But why accept only the players your team’s coaching staff has chosen? Why not go the extra yard, go beyond what Harbaugh was able to do, and create the...
Posted by Patrick Conte
Disruptive technology advancements will always drive shifts in channel sales behavior, as both vendors and solution providers move towards new requirements and solutions. We’re seeing this in the market now, as mobile solutions continue to evolve and enterprises struggle to deploy the right...
Posted by Hormazd Romer
There have been so many news stories of sophisticated data breaches lately that it’s easy to overlook more mundane ways that confidential data can be lost or stolen. Unfortunately, ordinary data breaches still occur. For example, earlier this year two healthcare organizations cumulatively...
Posted by Accellion Team
Three out of four managers surveyed recently by BMC Software say BYOD is a big productivity boost. There’s a very good reason for this - at the end of the day, employees bring those same devices home, where they use them for additional work late in the evening and early in the morning. That...
Posted by Accellion Team
A staggering 822 million records were exposed by data breaches in 2013, according to research firm Risk Based Security. Data breaches compel organizations to look at their network infrastructure and security processes, and shore up areas where inadvertent data leaks are taking place. The use of...

Pages