All items tagged with "consumerization of IT"

Study Shows Most IT Departments Fail To Explain Or Enforce iPhone/iPad Security

Study Shows Most IT Departments Fail To Explain Or Enforce iPhone/iPad Security

A new study shows that IT departments are dropping the ball when it comes to mobile security.

Another study of the bring your own device (BYOD) phenomenon concludes that the trend of employees bringing the personal iPhones, iPads, and other devices into the office shows no sign of slowing down. It also confirms previous reports that indicate many personal devices being used in the workplace don’t have even basic security features enabled.

The study by Coalfire, a company the specializes in IT risk management services, paints a particularly grim picture of the lack of security for iOS and Android devices in the workplace. With the BYOD trend show no signs of slowing or ending, Coalfire CEO Rick Dakin, notes that companies cannot afford to keep ignoring mobile security concerns.

Read the rest of this post »

How One Company Made A Multi-Million Dollar Blunder In Buying 14,000 iPads

How One Company Made A Multi-Million Dollar Blunder In Buying 14,000 iPads

What can businesses learn from a company that spent millions of dollars on thousands of iPads without knowing how they’d be used?

I’ve been a big proponent of the iPad in business since Apple first announced its tablet more than two and a half years ago. In that time, the iPad has more than proved its value in companies of all different sizes and across virtually every industry. That said, the iPad isn’t a fit for every job within every workplace. If a company is considering investing in iPads for its employees, one of the first things that company and its IT leaders need understand is how the iPad will be used.

That seems like a pretty basic step in the procurement process, but it’s one that seems to be getting overlooked by some companies – including one very large enterprise company that should have known better.

Read the rest of this post »

Startup Aims To Make Advanced Security Seamless By Using Your Location To Verify You’re You

Startup Aims To Make Advanced Security Seamless By Using Your Location To Verify You’re You

Toopher aims to use your location as a second way to verify you’re you that goes beyond a username and password.

When Dropbox acknowledged its recent data breach last week, the company noted that it will be adding a range of security solutions in an effort prevent such a breach from occurring again. One of the technologies that Dropbox plans to implement is two factor authentication, which requires another identifying item beyond your username and password to grant you access to your account.

The second item in two factor authentication can be any one of a range of technologies like a smart card that needs to be swiped, a USB flash drive or other mobile that contains security certifications, a one-time user password token like RSA’s SecurID, or a biometric input like a fingerprint scan.

One company has another interesting option, however, your location.

Read the rest of this post »

Apperian Agrees That The Future Of Mobile Management Is All About The Apps

Apperian Agrees That The Future Of Mobile Management Is All About The Apps

Mobile app management vendor Apperian responds to our post on the future of mobile management.

Earlier this week, I took a look at the ways mobile management has changedsince Apple introduced mobile management features in iOS 4 two years ago. The biggest change has been the evolution of what constitutes effective and secure mobile management, which has shifted from securing the physical and operating system features of iOS, Android, and BlackBerry devices to securing the business data that is stored on those devices. That shift has refocused IT leaders and professionals on the need to secure data by securing mobile apps – a type of solution referred to as mobile app management or MAM.

Our friends over at Apperian, one of the major MAM vendors, decided to share their thoughts with me (and you) in a video. Check it out after the jump.

Read the rest of this post »

Many Organizations Are Unprepared For Mass Adoption Of Employee iPhones and iPads

Many Organizations Are Unprepared For Mass Adoption Of Employee iPhones and iPads

BYOD programs are here to stay, but many companies still don’t secure employee devices.

The number of personally-owned iPads, iPhones, and other mobile devices that professionals bring into office is expected to more than double between now and 2014. That means the businesses that have so far been lax about considering or planning an official bring your own device (BYOD) program and/or establishing security policies around BYOD are going to need to play catch up – and they’ll need to get started as soon as possible.

Read the rest of this post »

Subscribe to the Cultcast

Major College Football Teams Join a Growing Number of NFL Teams Adopting The iPad

Major College Football Teams Join a Growing Number of NFL Teams Adopting The iPad

College football teams follow NFL teams in replacing playbooks with iPads.

Football season is just around the corner and the iPad is set to become a fixture for both college and pro teams. As we noted earlier in the year, a handful of NFL teams made the switch to iPad-based playbooks at the start of last season and more are making the switch this year. In addition to NFL teams, several colleges have announced that they are transitioning to the iPad playbook model as well.

Read the rest of this post »

Why Apps (Not MDM) Are The Future Of iPhone Management [Feature]

Why Apps (Not MDM) Are The Future Of iPhone Management [Feature]

Mobile management means securing apps and content as well as locking down devices.

There are plenty of stories out there about the explosive growth of mobile technology in the workplace. The trend towards bring your on device (BYOD) models in which employees are allowed or encouraged to bring their own iPhones, iPads, and other devices into the office is driving a massive expansion of the number of mobile devices used for work tasks. At the same time, the annual (or even more frequent) device an OS release cycles that have become common are driving up diversity of devices and resetting the mobile technology playing field every few months.

That constant change is forcing the IT professionals to adapt to new devices, apps, use cases, network models, and security threats faster than anything the IT industry has ever seen.

This is particularly visible in the mobile management space. A year ago, the primary method for handling mobile device and data security was to manage and lock down the device itself using one of dozens of mobile device management (MDM) suites on the market. Over the past six to nine months, however, MDM has been replaced by mobile app management (MAM) as the best way to secure business data. That’s a warp-speed transition in the mindset and goals of IT professionals.

Read the rest of this post »

Will Dropbox’s New Security Measures Kill Or Limit Functionality In iOS Apps?

Will Dropbox’s New Security Measures Kill Or Limit Functionality In iOS Apps?

Responding to a security breach, Dropbox plans new security tools, but they might be too burdensome for iPhone and iPad users.

In the aftermath of a data breach that it announced this week, Dropbox says that it will begin implementing new security measures. Those measures include new automated techniques for spotting suspicious behavior, a page where you can examine all active logins to your account, password update requirements, and two-factor authentication.

All of those are reasonable steps to take. That Dropbox hasn’t implemented most of those items before is a bit surprising. Only one of those items – two factor authentication – really puts a burden onto Dropbox users, but it could put a very big burden on iOS users and app developers.

Read the rest of this post »

Many Companies Supporting Employee iPhones And iPads Ignore Mobile Security

Many Companies Supporting Employee iPhones And iPads Ignore Mobile Security

A growing number of companies embracing BYOD are ignoring mobile security issues.

The number of companies investing in mobile management and security solutions related to bring your own device (BYOD) programs is growing, but not nearly as fast as the number of companies that are actually offering BYOD to their employees. The result is that many companies are putting themselves and their data at risk by jumping onto the BYOD bandwagon too quickly and without properly securing employee iPhones, iPads, and other devices or the business data that is stored on them.

Read the rest of this post »

USDA Rolls Out Thousands Of iPads, Says Other Tablets Don’t Measure Up

USDA Rolls Out Thousands Of iPads, Says Other Tablets Don’t Measure Up

iPads help USDA service survey farmers and collect agriculture data across the country.

The USDA is working its way through an ambitious iPad deployment that may come to serve as a model for a range of government agencies within the U.S. and around the world. The challenge was to develop a simple, intuitive, and effective field survey and data collection system.

The National Agricultural Statistics Service (NASS) is a division of the USDA that is charged with surveying and reporting agricultural data across the country. NASS operates in all 50 states plus Puerto Rico. With a staff of around 3,000 enumerators NASS conducts thousands of survey each year about agriculture across the country. The service has been operating since the mid-1800s and, until the iPad, it conducted surveys and collected data in pretty much the same way that it had back in the 19th century – with paper forms filled out by hand and mailed to various field offices. Although various technology initiatives have been tried by NASS since the 1980s, none was a successful fit before the iPad.

Read the rest of this post »