Matt Desch, CEO of Iridium Communications and a four-time Wash100 winner, has said the “bring your own device” arrangement is one of the top trends he has observed in the satellite communications sector. “The market is demanding reliable connections through personal mobile devices, regardless of location,” he told CommunicAsia in an …
Read More »SolarWinds’ Joe Kim: Federal IT Professionals Should Protect Networks Through End-User Device Monitoring
Joe Kim, a senior vice president and global chief technology officer at SolarWinds, has said federal information technology professionals should work to protect agencies’ IT systems amid the increasing number of laptops, mobile phones and other devices used on government networks. Kim wrote in a GCN article published Friday that …
Read More »Dell Survey: 82% of IT, Business Leaders Eye Enhanced Data Security Through Access Control
A new Dell survey says 82 percent of information technology executives and corporate leaders have made steps to limit employees’ data access points in an effort to improve data security. Dell said Tuesday it commissioned market research firm Penn Schoen Berland to poll 1,302 C-level IT executives at mid-market companies from the U.S., …
Read More »Report: Managed Security Services Market to Hit 11% CAGR Through 2019
A new Research and Markets report predicts that the global managed security services market will climb in value from 2014 to 2019 at a compound annual growth rate of 11.3 percent. The company said Monday the growth is due to increased demand for cloud services and adoption of bring-your-own-device practices, which have resulted …
Read More »Big Market Research: BYOD, Cyber Attacks to Boost Global Market for Managed Security Services
A Big Market Research study predicts the global market for managed security services to record a compound annual growth rate of 15.8 percent from 2014 through 2020. The research firm said Wednesday an increase in adoption of bring-your-own-device policies at workplaces and rising incidents of data breaches and cyber attacks are among the …
Read More »Oak Ridge Lab Taps Citrix Tool for Mobile Device Mgmt; Tina Snyder Comments
The Energy Department‘s Oak Ridge National Laboratory has moved to adopt a Citrix-built platform in an effort to centralize mobile device management operations, GCN reported Thursday. Stephanie Kanowitz writes ORNL mobile managers previously used two different MDM services to manage the national lab’s bring-your-own-device initiative and laboratory-owned devices but decided …
Read More »SolarWinds’ Joel Dolisy: Network Mgmt Key to Cutting IT Security Risks
Joel Dolisy, chief information officer of SolarWinds, wrote in a guest piece published Wednesday on GCN that government agencies can minimize security risks in their information technology systems by managing IT network performance. He recommended that agencies standardize their computer networks to help IT personnel to avoid configuration errors and …
Read More »Technavio’s Faisal Ghaus: Mobile Helps Drive Demand for Unified Comms-as-a-Service
Technavio has forecast a 28 percent year-over-year growth for the global unified communications-as-a-service market from 2015 to 2019. Faisal Ghaus, a vice president of Technavio, said Thursday the UCaaS market growth is driven by an increase in the use of smartphones for enterprise bring-your-own-device programs. Ghaus projected Asia Pacific will …
Read More »Microsoft’s Susie Adams: Data Governance Critical for Federal BYOD Programs
Susie Adams, chief technology officer of Microsoft‘s federal government business, has recommended that agencies implement user-focused security policies to manage personal devices in the workplace, GCN reported Friday. “It’s about governance first,” Adams told GCN in an interview. “Maintaining control over employee access to data regardless of the device becomes …
Read More »IoT Shifts Security Focus From Device Mgmt to Data Access Control
The Internet of Things is changing the way businesses manage network and data security by shifting their focus on data access using unified computing architectures rather than interoperability of various device platforms, CSO reported Monday. David Braue writes that the emergence of bring-your-own device corporate policies has opened considerations on mobile device …
Read More »TechNavio Sets 38% CAGR for Global Mobile Security Market
New analysis from TechNavio released Jan. 14 has set a 38.3 percent year-over-year growth for the global mobile security market from 2013 to 2018, citing increased demand amid the growing popularity of bring your own devices. The study predicts that a high adoption in smartphones will drive the market and expects obsolescence of security services to pose restraints on the market. According to the …
Read More »FireEye Integrates Threat Detect System into Samsung Knox; Manish Gupta Comments
FireEye has incorporated its mobile threat prevention offering into Samsung Knox-enabled devices in a move to help detect and mitigate malicious applications. The combined service works to scan apps using the FireEye mobile security tool to determine the app’s security status, block high-risk apps and notify users of malware, FireEye …
Read More »Research and Markets: Mobile Data Protection Market to Reach $3B by 2019
Research and Markets predicts that the global mobile data protection market will continue to experience fast-paced growth to reach a market value of $3.54 billion in five years at a compound annual growth rate of 22.4 percent from 2014 to 2019. The firm said Friday that the risk of data loss and theft due to the growing adoption …
Read More »Randy Fuerst, Oceus CEO, on Public Safety Market Opportunities and Federal BYOD Programs
Randy Fuerst, a nearly three-decade GovCon veteran, elevated to the CEO post at Reston, Virginia-based Oceus Networks earlier this year from his prior chief operating officer role there. He joined the broadband technology contractor in 2011 from CACI International, where he served as that company’s COO. Fuerst recently caught up with …
Read More »Lisa Durant: IT Should Base BYOD Policies on Users, Device, App, Content
Lisa Durant, a research analyst at Nemertes Research, says information technology companies that adopt bring-your-own-device programs should develop policies for the applications, content, users and their devices to protect the organization from data leaks. Durant wrote in a piece published Monday on AT&T‘s Networking Exchange Blog that administrators should cover these factors in their approach …
Read More »