Subscribe       Feed   All Posts     Search by Topic:

CTOs in the Education Sector are Focusing on Mobile Security

I have yet to see a CTO job description that highlights gymnastics as a pre-requisite. Yet, much of the role’s strategic planning and day-to-day operations are an ongoing balancing act. CTOs need to meet users’ 24x7 mobile computing needs, giving them everything needed to be successful and productive. While being on the hook to keep data access and file sharing secure.   

Move Your ECM Content into the Mobile-First World

SharePoint is in use in 78% of the Fortune 500, and competitors Documentum and OpenText boast their own impressive adoption rates. These enterprise content management (ECM) platforms not only provide secure on-premises storage for files and business data but also document collaboration functionality. However collaboration with external partners, supplier or any other external party is nearly impossible, and organizations are now looking to extend mobile access to people working outside the corporate firewall.

451 Research Takes a Hard Look at Box and Dropbox

Both Box and Dropbox began as consumer services for file sync and sharing, and are now focused on moving into the business of selling their services to enterprise organizations. With their nearly identical names, it is not surprising that many customers confuse the two companies.

To clear up that confusion, Alan Pelz-Sharpe of 451 Research recently issued a new report pointing out some stark differences between the two companies. Here’s a summary of how the companies differ:

Serving Up DRM with a Side of Usability

One of the biggest complaints we hear around digital rights management (DRM) is how complex it makes even the most basic of actions. While its intentions are pure – securing confidential data – it’s often considered too unwieldy to use in day-to-day activities.

5 Key Differences between Accellion and Box

Security questions stemming from Edward Snowden’s NSA revelations are continuing to concern IT leaders, who are now looking at just how much control they have over data housed in public cloud solutions. This is causing them to look more seriously at private cloud solutions for mobile file sharing, which were built for enterprises looking to have control over their sensitive business data. 

Mobilizing Your Road Warriors

When traveling for work – whether to a sales meeting two hours away or a product development meeting across the country – your employees aren’t just thinking about work, they are actually being productive. At least that’s what every organization hopes is happening.  

A survey conducted by HP of European business travelers revealed some interesting findings:

Mobile Adoption Increases Email Usage, Putting Data Security and Governance at Risk

When enterprises go mobile, email usage increases.

That’s just one finding in a new survey by Solar Winds about email usage and management in mid-size and large enterprises in the U.S. and Canada.

Too Many Employees Ignore BYOD Security

Considering the risks that BYOD mobile activity can pose to enterprises, CIOs have a right to be dismayed by two recent surveys showing just how little some employees care about protecting data on mobile devices.

A recent survey by Centrify found that:

Enterprises are Falling Behind on BYOD Security

New data breaches make headlines every week, and most IT departments are concerned, if not outright alarmed, about the security risks of BYOD. They cite data loss, illicit data access, and malware as top security concerns for their network and mobile users.

So how are enterprises doing when it comes to implementing security measures guarding against data breaches and malware infections resulting from BYOD? Not very well, according to recent surveys.

Researchers Find Security Flaw in Public Cloud File Sharing

Many public-cloud storage providers promise high levels of security for their clients’ data. However even those storage providers that claim that clients’ data is always encrypted may be susceptible to a design flaw that enables service provider employees to gain illicit access to that data, according to researchers at Johns Hopkins University.


Subscribe to RSS - blogs