Biometrics, the CIO’s challenge and how AI could finally improve mobile security

This publication once asked the question: is 2013 going to be the year of biometric security? While clearly something of an optimistic prediction, the past few years have been spent periodically lamenting the death throes of the traditional password, with seemingly minimal change.

But could we – finally – get the change the industry so desperately needs? Kevin Gilroy, executive vice president and head of Samsung Business, writes that...

By James Bourne, 31 March 2017, 0 comments. Categories: Authentication, Enterprise Mobility, Identity, Security.

It’s time to re-energise IT – and make the IT department more than a M*A*S*H unit


There’s no holding back the obvious truths in the land of IT. Helpdesks are inundated and overwhelmed; we are overworked and our teams are scrambling for some lucidity. The problem is simple, and most of us know: mundane, repeated and wearisome tasks that can, or probably should, be automated.

Much stress and time could be saved for our IT team’s employees by taking away some of these entanglements, but many organisations overlook doing so in the name of convenience...

By Dean Wiech, 07 February 2017, 0 comments. Categories: Employees, Identity, Security.

MobileIron introduces SSO for native apps to cure ‘app to cloud security’ gap


Enterprise mobility management (EMM) software provider MobileIron has announced single sign-on (SSO) capability for its Access platform, which enables users to only input their passwords once across different applications.

“Enterprises embracing mobile and cloud services expect the same security and single sign-on capabilities to work for their native mobile apps as with web-based accessed from a PC,” wrote Vijay Pawar, MobileIron director of product management

By James Bourne, 22 November 2016, 0 comments. Categories: Applications, Enterprise Mobility, Identity.

Two recent examples of how digital has the potential to transform healthcare


Whether it’s through applications, devices, or the data tying it all together, it’s evident that with the right path technology can transform healthcare. Two recent examples, from third sector technology provider Eduserv and open source tech giant Red Hat respectively, have shed some light on the challenges and opportunities the industry faces from both a European and American perspective.

The former comes through a recently released executive report – the second...

By James Bourne, 14 November 2016, 0 comments. Categories: Applications, Enterprise Mobility, Identity.

Why the future of identity is up in the clouds


In the last year, the volume of CIO mandates to be “cloud first” or only adopt cloud applications going forward, has increased significantly in large enterprises. Research from IDC forecasts that by 2019 enterprises will be spending more than £100 billion annually on cloud services.

When approached in the right manner, the cloud can deliver considerable benefits to organisations. But, there are several new challenges...

By Kevin Cunningham, 13 September 2016, 1 comment. Categories: CIO, Cloud , Identity.

The four steps to ensuring BYOD doesn’t affect the network


A note from enterprise network security provider Hypersocket Software argues how wearable tech and wear your own device (WYOD), as well as the Internet of Things (IoT) are further challenges on the horizon for organisations struggling to cope with a BYOD infiltration.

Lee Painter, CEO of Hypersocket, notes four ‘essential’ steps for organisations to take to ensure network security in the BYOD age. “Personal devices should pose no greater danger than company-issued...

By James Bourne, 09 September 2016, 1 comment. Categories: BYOD, Enterprise Mobility, Identity, Security.

How to ensure customer and employee satisfaction with multiple service desks


The Service Desk Institute recently researched the phenomenon of having several service desks in one organisation. The interesting thing about this research is that it provides numerical proof of what is happening in this area.

Their research reveals that 90% of the questioned organisations have more than one service desk. This means that almost every employee has to first consider where they send their request when they need service.

This often goes well for most, but it is not uncommon...

By Wolter Smit, 02 September 2016, 0 comments. Categories: Employees, Enterprise Mobility, Identity.

VMware announces new unified endpoint management and Windows 10 support

(c) Krakowiak

Day two of VMworld focused the conversation on VMware’s enterprise mobile arm, with the company announcing new unified endpoint management and identity management capabilities, as well as support for Windows 10.

Sanjay Poonen, who heads VMware’s end user computing segment, only had 30 minutes to play with, and as a result went through the portfolio at some speed. Unlike the ‘death by PowerPoint’ approach favoured in a lot of keynote sessions, the audience...

By James Bourne, 31 August 2016, 0 comments. Categories: Enterprise Mobility, Identity, Security.

Okta gives gloomy outlook for enterprises with legacy security systems


Almost two thirds of IT leaders expect a serious data breach to hit their companies within the next 12 months, according to the latest research from cloud identity and device management provider Okta.

The pessimistic finding, which was compiled from surveying 300 IT and security professionals, contained some other head-scratching results. There was a clear lack of consensus over whether security enables or compromises productivity and agility, with 52% saying it’s a compromise,...

By James Bourne, 22 August 2016, 1 comment. Categories: Employees, Enterprise Mobility, Identity.

Dashlane launches Spaces for mobile to separate work and personal passwords


Password management provider Dashlane has announced the launch of Spaces for mobile, which enables employees to separate business and personal information by using their business and personal passwords on mobile devices.

The company claims moving its Spaces product, launched last month, to mobile will be a ‘major step forward’ in helping businesses and IT manage the BYOD trend. “Companies and employees alike want to protect their credentials, and separate personal...

By James Bourne, 25 July 2016, 1 comment. Categories: Enterprise Mobility, Identity, Security.

It’s time to modernise authentication methods – or suffer the consequences


“Even the technology that promises to unite us, divides us” – Dan Brown, Angels & Demons

The way digital enterprises connect with their customers is changing.

Consumers are demanding more trusted and personalised experiences in exchange for their personally-identifiable information (PII), while businesses are struggling to protect user privacy in light of growing global security and privacy concerns.

Traditional authentication solutions and methods were simply...

By Richard Lack, 14 July 2016, 0 comments. Categories: Employee Education, Employees, Identity, Security.

The key to unlocking Identity 3.0 – and avoiding the hell of “crap” passwords


Identity is almost irretrievably broken – and those who are trying to fix it are going entirely the wrong way about it.

That was the underlying theme from an entertaining talk by Paul Simmonds, CEO of the not-for-profit Global Identity Foundation at Cloud and DevOps World, which puts a focus on finding a global identity solution which is privacy enhancing and globally scalable.

Pulling no punches in the early stages – describing passwords as “really crap”...

By James Bourne, 22 June 2016, 0 comments. Categories: Data & Analytics, Data Loss, Identity, Privacy.

Hello ID: Can voice activation web single sign on work in the enterprise?


Hello, ID. That’s right, users want to say 'hello' to ways in which they can easily gain access and permissions, and manage credentials to needed systems.

For system administrators, of course, access management and identity governance solutions, on their own, allow organisational leaders to easily support access rights and to greet the particulars of their organisations; for example, which users have access to what, when and why. But instead of being able to take a quick peek into...

By Robert Doswell, 17 May 2016, 0 comments. Categories: Employees, Enterprise Mobility, Identity.

Okta and Box team up for identity and security on Box for EMM


Identity and mobility management provider Okta has announced a partnership with Box to offer access to the cloud storage firm’s EMM product while shoring up employee security and data from every endpoint.

The resulting product, entitled Okta and Box for EMM, will enable IT departments to create policies defining how employees can access enterprise resources, as well as helping workers to access their files regardless of where they are using Box.

The move makes sense from a...

By James Bourne, 17 March 2016, 0 comments. Categories: Cloud , Enterprise Mobility, Identity.

Updating your information security strategy: Three tips for CISOs

(c) Moore

By Eric Hanselman, chief analyst, 451 Research

A new year means time for reflection for many, and thoughtful CISOs have a lot to consider. They’ve been through a lot recently, with increasing DDoS attacks and the quickening drumbeat of breach announcements.

But this is a time to consider more strategic approaches to delivering information security value. It’s critical to make changes that will enable an enhanced security posture in 2016. The IT landscape is changing, and...

By SafeNet, 18 February 2016, 0 comments. Categories: Enterprise Mobility, Identity, Security.

VMware launches Workspace ONE for greater enterprise secure, consumer simple experience

Picture credit: VMware

End user computing giant VMware has today launched Workspace ONE, a new platform for ‘delivering secure digital workspaces for flexible workstyles’, as well as announcing new advancements in its workspace solution VMware Horizon.

Workspace ONE aims to deliver and manage any app on any device through integration of identity, application, and enterprise mobility management (EMM), as well as naturally baking in EMM software from AirWatch.

“It is clear that...

By James Bourne, 09 February 2016, 0 comments. Categories: Employees, Enterprise Mobility, Identity.

Employee habits on enterprise identity and security: Not bad, but could do better


Even though the majority of enterprise employees believe it is risky to share passwords, 37% say they are likely to do so, according to the latest survey data from identity-defined security provider Ping Identity.

The survey, which polled 1,000 employees at US enterprise organisations – firms with more than 1000 employees – found more than half (58%) of respondents say protecting work-related information is more important than their personal emails and home address.

Half of...

By James Bourne, 04 December 2015, 0 comments. Categories: Employee Education, Employees, Enterprise Mobility, Identity, Security.

How to keep your business and employees as secure as MI6


It’s widely accepted that achieving perfect security is a pipe dream – but that doesn’t mean investing in better security for your business is something that should be ignored.

Many times, businesses play the ‘bad luck lottery’, thinking the odds of being a victim of a cyber attack or breach are too small to worry about. However, as any James Bond movie has shown us, even a sophisticated MI6 operative – with a nearly limitless array of hi-tech gadgets...

By Ryan Barrett, 06 November 2015, 0 comments. Categories: Employee Education, Employees, Identity, Security.

Gemalto study sheds light on how greater mobility rollouts remain a challenge


92% of IT departments globally continue to restrict users from accessing sensitive corporate data and resources from mobile devices, according to research from Gemalto.

The findings, which appear in the 2015 Global Authentication and Identity Access Management Index, reveal how enabling greater mobility remains a challenge for larger organisations. In particular, the vast majority (94%) of respondents are concerned their organisation will be breached or hacked in terms of compromised...

By James Bourne, 05 November 2015, 0 comments. Categories: Data Loss, Enterprise Mobility, Identity, Security.

Why access rights may be your biggest problem for data security in the enterprise


While there are many factors that can contribute to the success of an organisation, a huge threat to its health can be security risks. A security issue can often affect an enterprise more than even a period of low sales or decreasing growth rate.

The fact is, though, organisations tend to not focus on security measures until a breach or a significant hack takes place and by then it is too late. Hackers can steal company or customer data, which can have a big influence on profits and...

By Dean Wiech, 15 October 2015, 0 comments. Categories: Employees, Enterprise Mobility, Identity, Security.