Many organizations have adopted cloud computing, BYOD practices and expanded the use of social media, all of which require new technologies and security policies. Without changes, the security of a company is probably inadequate.
Companies are concerned about managing and privacy of data entrusted to service providers. It is unclear whether this [...]Continue Reading →
For years, companies and employees have struggled with the problem of bringing personal phones on the job. Now, the team of Dell has created an app called Virtual Smartphone which offers secure calls, messages and applications for Android and iOS alike.Continue Reading →
According to industry research firm Gartner, the worldwide market for cloud computing will grow 18.5 percent this year to $131 billion. One of the leading areas of adoption among companies of all sizes is file share and sync services such as Box, Dropbox, etc. These services are being used by [...]Continue Reading →
Cloud Security Alliance (CSA), the nonprofit organization whose mission is to promote the use of best practices for providing security assurance within cloud computing, is led by a broad coalition of industry professionals, companies, associations and other key stakeholders. Its mission is to promote the use of best practices for providing [...]Continue Reading →
In spite of the widespread belief that bringing data on the systems to an external service provider would create doubts on security, Gartner believes that the market for cloud security is among those set to grow more in recent years.
According to Gartner report, the market for cloud-based security will hit [...]Continue Reading →
With the aim of offering an assessment of the current situation of mobile computing and current threats to protect them, the Cloud Security Alliance (CSA) has published a guide specializing in critical areas with recommendations on best practices in this area.
The CSA has updated its Cloud Control Matrix (CCM) with [...]Continue Reading →
Instead of trying to stop BYOD phenomena, companies must focus on helping employees of smartphones and tablets, says market research firm Ovum.
According to the result of the “2013 BYOX – Bring Your Own Anything” survey, tablets are on rise in office. Trying to stand in the path of consumerized mobility [...]Continue Reading →
SMEs are increasingly dominating the market for security applications. New threats and BYOD let companies invest in their security. The turnover in the market for security software is therefore grown last year by about eight percent. Gartner reported the turnover of the global market for security software grew last year by [...]Continue Reading →
People are accustomed to using their beautifully-designed and easy-to-use productivity tools in their everyday life. As employees, they now have the same expectation for their work environment. Companies are allowing employees to use their own devices (BYOD) and adopt low-cost SaaS-based solutions to save IT substantial costs but this now renders [...]Continue Reading →
According to IDC, in 2013 the global volume of the enterprise networking market (which includes software defined networks (SDN)) will reach $42.4 billion, and will reach $50 billion, with growth across all categories, by 2017.
The volume of the Layer 2-3 switch market segment of the market [...]Continue Reading →
More and more companies encourage their employees to work on their devices, thus reducing the cost of computer equipment, but also increase the cost to maintain licenses and safety.
According to research by Gartner, half of the world’s companies will seek from their workers to individually provide devices for work [...]Continue Reading →
For those who follow the latest technology news, it is very common to read “BYOD” or Bring-Your-Own Device. The term has become popular due to the proliferation of mini-laptops, tables, and smartphones in the market today. Business owners are even mulling the idea of implementing their own Bring-Your-Own Device policy because a [...]Continue Reading →
According to the latest CIO Magazine Tech Poll/Tech Priorities survey, almost half, or 48 percent, of 269 top IT decision-makers report that they will increase IT spending [...]Continue Reading →
Social, mobile and cloud are more than just three of the most hyped buzz words in technology, they are three facets of the same movement and an everyday reality for consumers and businesses alike.
Whether you’re a college student streaming music [...]Continue Reading →
The Cloud Security Alliance (CSA) has released version 1.0 of the security guidance for critical areas of mobile computing. The guide details the various elements associated with mobile computing that corporations should consider and how to apply it in your business.
The document “Security Guidance for Critical Areas of Mobile [...]Continue Reading →
These past few years, there are a lot of people who are worried that we may be seeing the end of the PC market, even going so far as to coin the term “post-PC”, since PC sales are seeing a slow but steady decline, while portable devices such as tablets, smartphones, and [...]Continue Reading →
TagsAmazon Apple aws Big Data big data analytics big data solutions cloud Cloud computing cloud management Cloud Marketing cloud news cloud provider cloud providers Cloud Security CRM data center management Dev & Design Enterprise Enterprise Marketing ERP Gartner Google Government HP hybrid cloud IaaS ibm IDC Infrastructure-as-a-service microsoft mobile apps mobile cloud Openstack PaaS platform-as-a-service Private Cloud Public Cloud rackspace SaaS Salesforce.com Social Media software-as-a-service virtualization vmware weekly digest