Latest stories

  • IoT Shifts Security Focus From Device Mgmt to Data Access Control - top government contractors - best government contracting event
    in ,

    IoT Shifts Security Focus From Device Mgmt to Data Access Control

    The Internet of Things is changing the way businesses manage network and data security by shifting their focus on data access using unified computing architectures rather than interoperability of various device platforms, CSO reported Monday. David Braue writes that the emergence of bring-your-own device corporate policies has opened considerations on mobile device design, including the use of […] More

  • Research and Markets: Mobile Data Protection Market to Reach $3B by 2019 - top government contractors - best government contracting event
    in ,

    Research and Markets: Mobile Data Protection Market to Reach $3B by 2019

    Research and Markets predicts that the global mobile data protection market will continue to experience fast-paced growth to reach a market value of $3.54 billion in five years at a compound annual growth rate of 22.4 percent from 2014 to 2019. The firm said Friday that the risk of data loss and theft due to the growing adoption of bring-your-own-device practices at businesses as […] More

  • MarketsandMarkets: Mobile Data Protection Market to Grow at 22.4% CAGR Through 2019 - top government contractors - best government contracting event
    in ,

    MarketsandMarkets: Mobile Data Protection Market to Grow at 22.4% CAGR Through 2019

    A new MarketsandMarkets report indicates that the mobile data protection market will be worth $3.54 billion by 2019 due to the demand for measures that protect enterprise data as companies adopt bring-your-own-device and other mobility practices. The firm said Friday that the market value will climb at a compound annual growth rate of 22.4 percent over the next five years, […] More

  • Lisa Durant: IT Should Base BYOD Policies on Users, Device, App, Content - top government contractors - best government contracting event
    in ,

    Lisa Durant: IT Should Base BYOD Policies on Users, Device, App, Content

    Lisa Durant, a research analyst at Nemertes Research, says information technology companies that adopt bring-your-own-device programs should develop policies for the applications, content, users and their devices to protect the organization from data leaks. Durant wrote in a piece published Monday on AT&T‘s Networking Exchange Blog that administrators should cover these factors in their approach to help facilitate user flexibility and information […] More

  • Deloitte's Mark Michels: Planning Key to 'Right-Sizing' BYOD Policies - top government contractors - best government contracting event
    in ,

    Deloitte’s Mark Michels: Planning Key to ‘Right-Sizing’ BYOD Policies

    Mark Michels, Deloitte Discovery director at Deloitte Transactions and Business Analytics, said knowing the downside of bring-your-own-device programs and planning for them in advance puts organizations halfway to solving some of the greater legal challenges of smartphone technology in the workplace. “Understanding how mobile device use differs by global region, the risks un-vetted applications bring […] More

  • Neal Foster: Dell's Mobile Security Best Practices Hone on Devices, Strategies - top government contractors - best government contracting event
    in ,

    Neal Foster: Dell’s Mobile Security Best Practices Hone on Devices, Strategies

    Dell urges companies to consider work preferences, device types, operating systems, enablement as well as enterprise network and mobile platform security when adopting mobility and bring-your-own-device strategies. The company said Tuesday that enterprises must find the balance between mobility and security, as BYOD has been noted as one of the causes of security breaches in the […] More

  • Amit Jasuja: Oracle Mobile Security Tool for Companies With BYOD Initiatives - top government contractors - best government contracting event
    in ,

    Amit Jasuja: Oracle Mobile Security Tool for Companies With BYOD Initiatives

    Oracle has launched a mobile security product that is built to integrate identity and access management systems in order to protect enterprise data and applications on corporate and personal devices used in the workplace. The company said Feb. 26 that the Oracle Mobile Security Suite works to isolate personal and enterprise data and help corporate information technology staffers […] More

  • DMI Builds Agriculture Dept Mobile Mgmt System; Jay Sunny Bajaj Comments - top government contractors - best government contracting event
    in ,

    DMI Builds Agriculture Dept Mobile Mgmt System; Jay Sunny Bajaj Comments

    Digital Management Inc. has delivered an enterprise mobility infrastructure to the U.S. Agriculture Department for monitoring devices and applications across the 29-unit agency. DMI built the system under a potential five-year, $20 million contract, the company said Wednesday. USDA’s system is comprised of a mobile device management, an app store and a data encryption platform […] More