The Seven Laws of Mobile Enterprise Applications – LAW 2: MOBILE APPLICATIONS MUST BE ROLE BASED AND USER CONFIGURABLE

Over the years, enterprise software applications, including IT service management systems, have become bloated with unnecessary features and now invariably follow the 90-10 rule: 90 percent of users rely on 10 percent of the features. This unfortunate reality has had limited impact on PC application usage because it is relatively […]

2016-10-13T10:21:01-04:00December 21st, 2011|Blog|

The Seven Laws of Mobile Enterprise Applications – LAW 1: MOBILE APPLICATIONS MUST BE PRESENCE AWARE

Unlike the simple, flat, tethered PC experience, mobile devices are always at your side and participate, actively or passively, in all your activities. They are always connected to the Internet, store vital details about you, including your schedule and personal network, and have surprising amounts of idle computing power. Mobile […]

2016-10-13T10:21:02-04:00December 20th, 2011|Blog|

2012 Security Predictions

According to Help Net Security, these are the influential security trends to watch in 2012. What do you think?

1. The human perimeter

Expectation: further examples of the socially engineered email attacks combined with zero day exploits as perpetrated against RSA and its client base, Operation Aurora and Google Gmail.

Prevention: Frequent staff training and […]

2018-07-20T13:41:36-04:00December 15th, 2011|Blog|

Cloud Security Checklist

In our survey of IT professionals, 61% of people said data security in the cloud is a shared responsibility between cloud provider and data owner. Another 37% said it’s completely the data owner’s responsibility to keep it secure. But how exactly do you ensure the security of […]

2020-10-16T13:03:01-04:00December 14th, 2011|Blog|
Go to Top