Majority of IT managers say they work on mobile security without EMM or MMS help

More than half of respondents in a survey conducted by mobility and telecom expense management (TEM) provider Tangoe say their job to manage mobile devices ploughs a lonely furrow.

In other words, of the 100 IT managers polled, across a variety of enterprises, very few are using enterprise mobility management (EMM) or managed mobility (MMS) offerings – although many plan to over the next two years.

Given this publication has

By James Bourne, 16 March 2017, 0 comments. Categories: Enterprise Mobility, Research, Security.

A note to CEOs: Shadow IT is not someone else’s problem

Trends like bring your own device (BYOD) and bring your own app (BYOA) – or shadow IT as some industry observers call it - are fast spreading throughout the workplace.

On the whole, they are welcomed by the enterprise for the additional flexibility and productivity benefits they bring.  After all, letting employees use their own phones and apps for work tasks saves time and investment on new IT, right?

But there’s a catch.

Alongside the benefits, shadow IT is also allowing fresh...

By Omri Sigelman, 16 March 2017, 0 comments. Categories: Applications, BYOD, CIO, Employees, Enterprise Mobility, Security.

Why your new enterprise app will fail: Avoid these classic pitfalls

(c)iStock.com/erhui1979

Last year, we wrote a blog post about what employees want in enterprise mobile apps. The key criteria were (and still are) simple: employees want apps that work, that make their lives easier, and that are easy to use.

Follow those guidelines, and it’s more likely than not that your app will succeed given the right infrastructure and strategy. But what about the opposite end of the spectrum: what are some signs your shiny new app might fail?

Nitesh...

By App47, 20 February 2017, 0 comments. Categories: Applications, Enterprise Mobility, Security.

Many local authorities lagging behind on BYOD, research warns

(c)iStock.com/pixsooz

Almost half of local authorities in England do not have a bring your own device (BYOD) policy in place, according to new research from Annodata.

The managed service provider submitted a freedom of information request to 79 council districts from all regions in England, and found 42% do not have BYOD implementation.

“The public sector in particular needs to approach BYOD with due diligence and special emphasis needs to be placed on security when employees are using their own devices...

By James Bourne, 16 February 2017, 1 comment. Categories: BYOD, Employees, Enterprise Mobility, Security.

How the CIO role has been ‘completely transformed’ in recent years through IT shift

(c)iStock.com/Akindo

One in three CIOs say their job role has been ‘completely transformed’ in recent years while another third say their job has become more important in their company’s hierarchy, according to a new piece of research from Bitdefender.

The study, titled ‘Virtualisation makes CIOs’ roles key’, surveyed more than 150 UK-based IT decision makers in companies with more than 1,000 PCs, and found some worrying security findings. Only 55% of incoming cyberattacks...

By James Bourne, 15 February 2017, 0 comments. Categories: CIO, Enterprise Mobility, Security.

How CSOs can avoid the shadow of a cybersecurity Groundhog Day

(c)iStock.com/LordRunar

Every year, in Pennsylvania, people gather in droves to watch a groundhog predict how much longer winter will last. For Americans, it’s a pretty big deal to see this glorified gerbil pop up and look terrified as throngs of onlookers wait in hushed silence to see whether the mighty Phil from Punxsutawney will see his shadow. 

Historically, the varmint is only 39% accurate, but in truth that’s probably better than most human non-groundhog meteorologists.

Like groundhogs,...

By Duncan Hughes, 14 February 2017, 0 comments. Categories: CIO, Security.

WebEx most popular enterprise app says MobileIron – yet organisational bad practices remain

(c)iStock.com/allvisionn

WebEx is the most popular enterprise app installed by MobileIron customers, with Dropbox, Facebook and WhatsApp among the most frequently blacklisted, according to a new report.

The study, the enterprise mobility management (EMM) provider’s third Mobile Security and Risk Review report, also found that almost 80% of firms are using more than 10 apps for business, with almost one in five (18%) using Apple’s Volume Purchase Program (VPP) – a number which goes up in...

By James Bourne, 13 February 2017, 0 comments. Categories: Applications, Data Loss, Enterprise Mobility, Security.

Skycure integrates with Microsoft EMS in enhanced mobile security play

(c)iStock.com/JasonDoiy

Mobile threat defence provider Skycure has announced it is collaborating with Microsoft on integrating its platform with Microsoft Enterprise Mobility + Security (EMS).

The collaboration ‘allows organisations to more confidently address the needs of today’s mobile workforce, ensuring that devices are risk-free and secure before accessing corporate resources’, according to the press materials.

Customers should expect ‘seamless integration’ with EMS,

By James Bourne, 09 February 2017, 1 comment. Categories: Enterprise Mobility, Microsoft, Security.

CISO research advocates ’30 day sprint’ to get privileged credentials up to date

(c)iStock.com/erhui1979

If you had a panel of Global 1000 chief information security officers (CISO) at your disposal, what would you ask them? A new report issued by CyberArk argues organisations can improve their security fitness and protect privileged credentials in a ’30 day sprint’.

The report outlines a ‘proven framework’ to implement a set of key controls around privileged credentials, noting that organisations can make gains ‘with a sufficient sense of urgency’. In...

By James Bourne, 08 February 2017, 0 comments. Categories: Data Loss, Employees, Security.

It’s time to re-energise IT – and make the IT department more than a M*A*S*H unit

(c)iStock.com/BrianAJackson

There’s no holding back the obvious truths in the land of IT. Helpdesks are inundated and overwhelmed; we are overworked and our teams are scrambling for some lucidity. The problem is simple, and most of us know: mundane, repeated and wearisome tasks that can, or probably should, be automated.

Much stress and time could be saved for our IT team’s employees by taking away some of these entanglements, but many organisations overlook doing so in the name of convenience...

By Dean Wiech, 07 February 2017, 0 comments. Categories: Employees, Identity, Security.

DDoS attacks grew at CAGR of 68% over past five years, says Arbor Networks

(c)iStock.com/daoleduc

Here’s news we already suspected: DDoS attacks are getting larger and becoming more frequent and complex with it, according to a report released by Arbor Networks. 

The company, the security division of application and performance management firm NetScout, has released its 12th annual worldwide infrastructure security report, and of the 356 respondents, from a mix of service providers, hosting, mobile, enterprise, and network operators, the threat landscape has been...

By Enterprise AppsTech, 30 January 2017, 0 comments. Categories: Data & Analytics, Data Loss, Malware, Security.

Bitglass unveils new agentless mobile security patent, takes aim at MDM

(c)iStock.com/maxkabakov

Enterprise data security provider Bitglass has secured a new patent around agentless mobile security, the company has announced.

The patent, US #9,553,867, available to view here (registration required), enables Bitglass to synchronise a lost, stolen or deprovisioned device with a null mail or calendar account. In other words, it represents an operation where no agent – a service, daemon or process – needs to run in the background of a...

By James Bourne, 26 January 2017, 0 comments. Categories: Cloud , Enterprise Mobility, MDM, Security.

Enterprise ‘cloudification’ and EMM security highlights of Strategy Analytics predictions

(c)iStock.com/Courtney Keating

Research firm Strategy Analytics has sifted through all the tea leaves and looked through the crystal ball to come up with mobility predictions for the coming year, with ‘cloudification’ of the enterprise and integration between enterprise mobility management (EMM) and mobile security tools the standout picks.

The company, in its

By James Bourne, 25 January 2017, 0 comments. Categories: Cloud , Enterprise Mobility, Security.

2017’s anticipated attacks for CIOs: DDoS, IoT, and more

(c)iStock.com/serkorkin

Along with well wishes, this New Year we have been inundated with warnings from experts and journalists that 2017 will entail an upsurge of DDoS, IoT and Ransomware attacks that will exceed by far 2016’s record. So with warnings must come action – which is where we propose that prevention is the best form of defence.

2016 saw some of the most well-established and public facing companies as the target of cyber criminals attacks, the most notable being the Yahoo hack which...

By Mike Hemes, 25 January 2017, 1 comment. Categories: CIO, Enterprise Mobility, IoT, Security.

Healthcare becoming more mobile but one in four firms concerned over MDM

(c)iStock.com/BrianAJackson

More than a quarter of healthcare organisations are less than confident in their chosen mobile device management (MDM) in batting away security attacks, according to a new report from Jamf.

The study, which was conducted by analyst firm Vanson Bourne, found a refreshingly high number of healthcare firms going in with mobility at the outset; 83% say they currently provide mobile devices to caregiving staff. Yet the same number cited security as the highest priority concern with...

By James Bourne, 23 January 2017, 0 comments. Categories: Enterprise Mobility, MDM, Security.

Why healthcare is a vulnerable sector for cyber attack – and what can be done about it

(c)iStock.com/jackaldu

2017 is set to feature greater attacks on internet security; the broad adoption of IoT seen to be easily compromised coupled with data often held on legacy systems is likely to capture attention.

Healthcare represents one of the sectors vulnerable to IoT attacks. As more and more people adopt smart wearables and mobile apps tracking fitness the bank of hackable data for cyber criminals is growing and the value of the information is increasing which makes attacking more rewarding....

By Duncan Hughes, 17 January 2017, 0 comments. Categories: Data & Analytics, Data Loss, IoT, Security.

Mobility investments moving more towards the business – but is this the full story?

(c)iStock.com/erhui1979

How are organisations investing in mobile technology, and what will 2017 bring? These are among the questions that Nick McQuire, VP enterprise at CCS Insight and contributor to this publication, has been exploring in his recent work.

The latest edition of CCS Insight’s enterprise IT buyers survey landed at the very back end of 2016, with lots of continuity but some interesting and challenging findings. The study, which quizzed 400 mobile technology decision makers in Europe and...

By James Bourne, 16 January 2017, 0 comments. Categories: Enterprise Mobility, Microsoft, Security.

Arxan acquires MAM provider Apperian to enhance mobile and IoT operations

(c)iStock.com/Maxiphoto

Application security provider Arxan Technologies has announced the acquisition of mobile app management (MAM) provider Apperian to help its mobile and Internet of Things (IoT) push.

Discussions between the two companies had been going on for almost a year with a plethora of options on the table, from strategic partnerships to investment, before settling on acquisition because both companies’ management “felt that there were so many synergies that the companies could maximise impact and...

By James Bourne, 11 January 2017, 0 comments. Categories: Applications, Enterprise Mobility, M&A, MAM, Security.

The weapon of openness, or how open email benefits productivity and security

(c)iStock.com/merznatalia

“The best weapon of a dictatorship is secrecy”, said the Nobel Prize-winning physicist Niels Bohr. “The best weapon of a democracy should be the weapon of openness.”

It’s a principle that goes far beyond politics. The rapid advance of technology has led to a significant increase in the amount of data companies are collecting, and this, in turn, has effectively created two kinds of corporate environment: those where knowledge and information are shared...

By Peter Linas, 10 January 2017, 0 comments. Categories: Employees, Security.

Bitglass secures $45m in new funding to bolster EMEA expansion

(c)iStock.com/Gizelka

Enterprise data security provider Bitglass has announced it has raised $45 million in series C funding, five weeks after announcing it was expanding to the EMEA region.

The round, which featured new investor Future Fund alongside existing investors Norwest, NEA and SingTel Innov8, brings the company’s total funding to $80m, with the company saying it will use it to expand in EMEA,...

By James Bourne, 06 January 2017, 0 comments. Categories: M&A, Security.