Subscribe       Feed   All Posts     Search by Topic:

New Study Highlights the Risks of Bring Your Own Cloud (BYOC)

A new study by the Ponemon Institute, The Insider Threat of Bring Your Own Cloud (BYOC), analyzes the risks of enterprise employees using cloud services without the permission or oversight of the IT department—a practice that the study’s author calls “Bring Your Own Cloud (BYOC).”

Consumer Solutions are Revolutionizing Enterprise Computing

Are consumer solutions revolutionizing the way that enterprise software is created? Quentin Hardy of The New York Times says yes, and points to the increasingly short time period between product updates on newer solutions like Workday, as compared to product updates from traditional enterprise vendors like Oracle that can take years to be released.

Are Cloud Services Taking on a Life of Their Own?

A new report from SkyHigh Networks – a company that tracks the use of cloud services for corporate customers – found that cloud services are growing exponentially within enterprises. The findings in the report were based on traffic generated in the cloud by more than 8.3 million users in organizations spanning multiple industries.

What Consumers Risk When They Put All Their Data in a Public Cloud

Are consumers better off putting everything in the cloud?

A recent article in the Wall Street Journal asked that question and presented answers by two industry pundits:  Frank Gillett of Forrester Research and Triona Guidry of Guidry Consulting, Inc.

Good News: Enterprises Take Mobile Security Risks to Heart

According to Good Technology’s “Q1 2014 Good Mobility Index Report”, more companies than ever are taking steps to mitigate security risks by leveraging secure mobile apps. The report found that secure enterprise app activations among its customer base grew 57 percent from Q4 2013, which is great news.

CTOs in the Education Sector are Focusing on Mobile Security

I have yet to see a CTO job description that highlights gymnastics as a pre-requisite. Yet, much of the role’s strategic planning and day-to-day operations are an ongoing balancing act. CTOs need to meet users’ 24x7 mobile computing needs, giving them everything needed to be successful and productive. While being on the hook to keep data access and file sharing secure.   

Move Your ECM Content into the Mobile-First World

SharePoint is in use in 78% of the Fortune 500, and competitors Documentum and OpenText boast their own impressive adoption rates. These enterprise content management (ECM) platforms not only provide secure on-premises storage for files and business data but also document collaboration functionality. However collaboration with external partners, supplier or any other external party is nearly impossible, and organizations are now looking to extend mobile access to people working outside the corporate firewall.

451 Research Takes a Hard Look at Box and Dropbox

Both Box and Dropbox began as consumer services for file sync and sharing, and are now focused on moving into the business of selling their services to enterprise organizations. With their nearly identical names, it is not surprising that many customers confuse the two companies.

To clear up that confusion, Alan Pelz-Sharpe of 451 Research recently issued a new report pointing out some stark differences between the two companies. Here’s a summary of how the companies differ:

Serving Up DRM with a Side of Usability

One of the biggest complaints we hear around digital rights management (DRM) is how complex it makes even the most basic of actions. While its intentions are pure – securing confidential data – it’s often considered too unwieldy to use in day-to-day activities.

5 Key Differences between Accellion and Box

Security questions stemming from Edward Snowden’s NSA revelations are continuing to concern IT leaders, who are now looking at just how much control they have over data housed in public cloud solutions. This is causing them to look more seriously at private cloud solutions for mobile file sharing, which were built for enterprises looking to have control over their sensitive business data. 


Subscribe to RSS - blogs