More and more companies encourage their employees to work on their devices, thus reducing the cost of computer equipment, but also increase the cost to maintain licenses and safety. According to research by Gartner, half of the world’s companies will seek from their workers to individually provide devices for work by 2017. It is estimated…

For those who follow the latest technology news, it is very common to read “BYOD” or Bring-Your-Own Device. The term has become popular due to the proliferation of mini-laptops, tables, and smartphones in the market today. Business owners are even mulling the idea of implementing their own Bring-Your-Own Device policy because a lot of people…

IT decision-makers are expected to increase spending on mobile technology, cloud computing services, and business intelligence and analytics over the next 12 months. According to the latest CIO Magazine Tech Poll/Tech Priorities survey, almost half, or 48 percent, of 269 top IT decision-makers report that they will increase IT spending over the next year, almost…

By Scott Hebner, Vice President, IBM Cloud & Business Infrastructure Management Social, mobile and cloud are more than just three of the most hyped buzz words in technology, they are three facets of the same movement and an everyday reality for consumers and businesses alike. Whether you’re a college student streaming music on a smartphone…

The Cloud Security Alliance (CSA) has released version 1.0 of the security guidance for critical areas of mobile computing. The guide details the various elements associated with mobile computing that corporations should consider and how to apply it in your business. The document “Security Guidance for Critical Areas of Mobile Computing” at Cloud Security Alliance…

Cisco announces new security solutions aimed at strengthening data centers against threats generated by consolidation and virtualization. The new Cisco security solutions help to strengthen the protection of data centers and mobile workforce. The new offering includes a highly scalable software firewalls for Cisco Adaptive Security Appliance (ASA), a virtualized ASA firewall for multiuser environments…

by Paula Skokowski Where’s Your Data? In the world of IT, what could be more fundamental than keeping control of enterprise data and making that data accessible to authorized employees? Yet today, a growing number of IT organizations find it challenging to meet this requirement. Why? The consumerization of IT and the dawn of the Bring…

The California-based Box boasts of 11 million existing users and is currently positioning itself in the market as an IT-friendly safe and secure way for users, particularly business-oriented ones, to store presentations, documents, and photos that can be shared as needed. The new enterprise-wide search capability gives system administrators the ability to search, view, and…