Enterprise Mobility: The Future is Now

by Brian Duckering of Symantec Throughout the modern history of business, there have been countless technological innovations that have improved the way companies work. However, a few stand out from the rest in their capacity to disrupt the status quo. Perhaps the most obvious recent examples of such technological advances are the PC and the…

The War on Cybercrime is Not Lost con’t

Key 3: More management buy-in on security posture Concerns about security are moving up the corporate ladder as the war for data continues. C-level executives are now joining IT staff in participating in the development of strategic measures. By implementing business-wide policies and monitoring tools, IT is able to gather and communicate detailed information about…

The 5 Most Overlooked BYOD Mistakes to Avoid

by Roger Yang is the CEO of Avema Critical Wireless Businesses of all shapes and sizes are struggling with the bring your own device (BYOD) phenomena. On one hand, BYOD is a boon. Employees get the devices they like. Often they pay for them out of their own pockets, and productivity goes up. On the…

The Security Tools CIOs are Buying Now

Security issues are so ubiquitous that many CIOs are tempted to bow to the seemingly inevitable and just buy insurance to blunt the losses. Cyber insurance coverage may be a good idea for some companies but it should never be used as a cop-out on locking the data center doors. Fortunately, most companies are continuing…

Big Data a $50 Billion Market by 2012?

The world is buzzing about Big Data and it begs the question: “How big is the Big Data market?” Unable to find any market size information, Wikibon, a open-source-style community of industry analysts, kicked off a project to study the size and forecast the market and report on market shares. The study, How Big is…

BYOD & BYOC Security Concerns may Change Everything

by Geoff Webb of Credant Technologies If you were the CISO of a large enterprise you’d already know that an IT security earthquake may well be on the way because there is a fault line that runs beneath most of the assumptions upon which we have built the last decade of security progress. That fault…

How to Manage the BYOD Quandary

by John Lytle of ISG Employees of large business enterprises are increasingly bringing iPads, iPhones, Android, and other devices to the office and using them for work-related purposes. This trend, the consumerization of IT or the bring your own device (BYOD) phenomenon, has CIOs concerned, and rightly so. The proliferation of personal electronic devices in…

The Technologies Driving IT into Transition

At a recent round table in Portsmouth, New Hampshire, EMA solicited inputs from a number of local IT managers, executives and professionals on topics of interest. While the range was wide and varied — from end-to-end e-mail and mobility, to APM and service management, to change, configuration and asset management — the No. 1 outstanding…

The Top 20 Technology Driven Trends for 2012

11) Digital identity management will become increasingly important to both organizations and individuals as new software allows users to better manage their multiple identities across business and personal networks. Next generation biometrics will play a key role in both identity management and security. 12) Visual communications takes video conferencing to a new level with programs…

The Top 20 Technology Driven Trends for 2012

No matter what industry you’re in, your company can’t survive without technology. And these days, even non-technical employees know that technology goes way beyond desktop computers and networks. From smart phones and tablet computers to mobile apps and cloud-based technology, there’s a plethora of technological advancements to not only keep track of, but also to…