|It is currently Sat Nov 23, 2024 2:29 pm Login / Join Codemiles

Java

C/C++

PHP

C#

HTML

CSS

ASP

Javascript

JQuery

AJAX

XSD

Python

Matlab

R Scripts

Weka

Author
extendcode
Offline
Newbie
Newbie
USER_AVATAR

Joined: Fri Sep 07, 2012 1:12 pm
Posts: 0
Location: Gurgaon, India
Blog: View Blog (3)

Archives
- October 2012
BYOD and its Impact on Enterprise Mobility Market
   Tue Oct 16, 2012 12:58 pm

+ September 2012

Search Blogs


 [ 3 blog entries ] 

Display posts from previous:  Sort by  
Feed  
Permanent LinkPosted: Tue Oct 16, 2012 12:58 pm 
Many CIOs (Chief Information Officers) look back to the early days of enterprise mobility as the good old days, when things were just so much simpler for them. There were few mobility devices and fewer platforms, which made it much easier to implement security solutions. Most of the enterprise employees were baby boomers and the attempts to circumvent company security were much fewer. In those early days, the mobility devices were mostly company owned and provided to the employees for carrying out the company’s work. The cost of buying and maintaining such devices was considered to be a necessary evil by most companies in those days. At that point, few people could have predicted that there was a storm coming.

The storm came with the introduction of the first Apple iPhone, intensified with the advent of devices powered by Google’s android and the whole enterprise mobility landscape started to change at a rapid pace. The availability of iPhone and Android powered devices, which were cap...

[ Continued ]


 Viewed 901890 times
Permanent LinkPosted: Wed Sep 26, 2012 1:36 pm 
The Introduction of Containers

Since the early days of enterprise mobility, IT departments all over the world have grappled with how to control accessibility of emerging mobility devices and what kind of action can help prevent unauthorized access of enterprise data even if a device is lost or stolen. These have been burning questions for IT departments worldwide and many organizational have come up with techniques to handle the possibility of network security breaches. Some of the common methods of combating the risk associated with implementing enterprise mobility at the workplace include: enforcement of password policies for connecting to network and accessing information; configuring a device for remote wipe prior to allowing its use on the enterprise network; enforcement of VPN (Virtual Private Networks) for connections between enterprise servers and mobile devices. However in the ever changing IT and mobile solutions market, the flooding of new devices led...

[ Continued ]


 Viewed 351152 times
Permanent LinkPosted: Fri Sep 07, 2012 1:58 pm 
In today’s digital age information is power and all critical information is currently stored on protected servers operated by companies themselves or by 3rd party operators. If a company cannot protect its data from access by unauthorized individuals, the result can be devastating for the company itself as well as all vendors and stakeholders involved with the company. Such critical data which are usually protected using leading information security services can be used by unauthorized individuals to commit crimes such as insider trading, tender fixing etc. Countries all over the world have laws to prevent such unauthorized data access and non-compliance with the guidelines is cognizable offence with the companies paying hefty fines to the government, if the data security measures are breached. However, a common question that arises is how to companies ensure that their data stays protected from access by unauthorized individuals. Some of the security solutions designed to ensure proper d...

[ Continued ]


 Viewed 353844 times

 [ 3 blog entries ] 

All times are UTC [ DST ]


cron






Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group
All copyrights reserved to codemiles.com 2007-2011
mileX v1.0 designed by codemiles team
Codemiles.com is a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for sites to earn advertising fees by advertising and linking to Amazon.com