The BYOD security Battleground
|
|
|
- Eunice Norris
- 9 years ago
- Views:
Transcription
1 The BYOD security Battleground October, 21 st 2015
2 Agenda - INTRODUCTIONS & HOUSE RULES - BYOD AND ITS IMPACT ON THE ENTERPRISE - SWOT ANALYSIS ON DLP, MDM, MAM - LEVERAGING RIGHTSWATCH IN A BYOD WORLD - Q&A 10/21/2015 Copyright All Rights Reserved. 2
3 Introductions Chris Hazelton Chris is Research Director, Enterprise Mobility at 451 Research. His research focuses on mobile management and productivity tools for business. He covers the shift in enterprise computing from desktop to mobile. Rui Melo Biscaia Rui serves as the Director of Product Management for Watchful Software, and is responsible for the company's product direction and go-to-market House Rules You are muted centrally. You don t need to mute/unmute yourself This webinar is being recorded. You ll have access to it On-demand at The Q&A session will be at the end. You are welcomed to enter questions anytime, using the Questions feature in the GoToWebinar control panel 10/21/2015 Copyright All Rights Reserved. 3
4 BYOD Data protection realities 70% 57% 46% 70% of tablet owners use their personal device to access corporate data 57% of smartphone owners use their personal device to access corporate data 46% of BYOD use is unmanaged by employers or ignored, potentially exposing corporate data
5 The BYOD Security Battleground Chris Hazelton Research Director, Enterprise Mobility
6 451 Research is an information technology research & advisory company Founded in 2000 Research & Data Advisory Services Events 210+ employees, including over 100 analysts 1,000+ clients: Technology & Service providers, corporate advisory, finance, professional services, and IT decision makers 19,000+ senior IT professionals in our research community Over 52 million data points each quarter 4,500+ reports published each year covering 2,000+ innovative technology & service providers 451 Research and its sister company Uptime Institute comprise the two divisions of The 451 Group Headquartered in New York City with offices in London, Boston, San Francisco, Washington D.C., Mexico, Costa Rica, Brazil, Spain, U.A.E., Russia, Taiwan, Singapore, and Malaysia
7 A combination of research & data is delivered across fourteen channels aligned to the prevailing topics and technologies of digital infrastructure from the datacenter core to the mobile edge. 7
8 BYOD and its impact on the enterprise
9 EU employees: Use of mobile apps Source: 451 Research, European Employee Survey, January 2015 Base: Asked everybody
10 Acceptance for BYOD Source: 451 Research, US IT Decision-Maker Survey, June 2015 Base: Asked everybody
11 Concern about data on employees devices Source: 451 Research, US IT Decision-Maker Survey, June 2015 Base: Asked everybody
12 Adoption of security tools for BYOD Source: 451 Research, US IT Decision-Maker Survey, June 2015 Base: Asked everybody
13 Strengths, Weaknesses, Opportunities, and Threats analysis
14 SWOT for MDM Strength Meets initial pain points of the enterprise Weakness In BYOD deployments can be seen as heavy-handed Mobile Device Management Opportunity Client software footprint for app lifecycle management Threat MAM only, Exchange, and wait and see approaches
15 SWOT for MAM Strength Provides control point for future IT mobile pain point Weakness Requires access to binary or developer support for SDK Mobile App Management Opportunity Focus on apps not device, acceptable to users and IT Threat Will become feature of MDM
16 SWOT for DLP Strength Check compliance box, basis for comprehensive data security program Weakness Hard to find sensitive data or classify it, lots of false/positives. Hard on mobile and for cloud Data Loss Protection Opportunity Simple DLP solutions for SMB and mid market Threat Cloud security vendors offering DLP lite, blocking specific data
17 Audience Poll What are your primary concerns about supporting mobile users? 1. Potential loss of data or other intellectual property 2. Securing corporate data on individually-owned devices 3. Providing secure access to internal network for mobile employees 4. Controlling the spread of malware from mobile employees 5. De-provisioning internal users when they leave the organization
18 The BYOD Security Battleground Rui Melo Biscaia Director of Product Management
19 The perimeter is fading FORBID IS A POLICY Mobile devices have crossed the perimeter and are far beyond from system defences, opening massive holes in information security 10/21/2015 Copyright All Rights Reserved. 19
20 To keep users productive while protecting information you need to Manage users: who, when Manage devices: which, where Manage information: who, where, which and when
21 To manage information you need RightsWATCH Tuesday June 23rd 2015 WEBINAR: "You Can t Teach an Old Dog New Tricks" 21
22 How to do it with RightsWATCH? 10/21/2015 Copyright All Rights Reserved. 22
23 RightsWATCH support for BYOD Support for Read RMS protected messages Create RMS protected messages Reply/forward RMS protected s (Online & Offline) Protected Files Read protected Office files (Online / Offline) Read protected PDF files (Online & Offline) Read Other RMS protected.pfiles (e.g..ptxt) Create Other RMS protected.pfile (e.g. Image) Extended w/rightswatch 10/21/2015 Copyright All Rights Reserved. 23
24 RightsWATCH is built on Discovery - Policy driven discovery of sensitive data. Relieving the user from the workload and overhead of having to know, understand and apply corporate policy Classification - Implements a Multilevel Security Model to classify data. Increases awareness, educates, and supports adherence to corporate governance and policies Encryption - Data is strongly encrypted at rest, in motion and in-use Access Controls - User identities are used to restrict access Policy enforcement - Granular rights control individual actions and behaviors Logging - Usage and Access logging enabling to perform comprehensive audit trails for information Tracking and forensic analysis
25 Q&A Check out the Resources area on and watch short product walkthrough demonstrations of how RightsWATCH address a comprehensive set of use cases [email protected] to request a demo of RightsWATCH This webinar is being recorded. You ll have access to it On-demand at 10/21/2015 Copyright All Rights Reserved. 25
26 The BYOD security Battleground October, 21 st 2015
The X-Factor in Data-Centric Security. Webinar, Tuesday July 14 th 2015
The X-Factor in Data-Centric Security Webinar, Tuesday July 14 th 2015 *The Insider Threat SpotlIght Report Tuesday July 14th 2015 WEBINAR: The X-Factor in Data" 2 Agenda Introductions & House Rules A
RightsWATCH. Data-centric Security.
RightsWATCH. Data-centric Security. Rui Melo Biscaia, Watchful Software www.watchfulsoftware.com Director of Product Management [email protected] The Perimeter Paradigm Well Meant Insider
Best Practices for a BYOD World
Face Today s Threats Head-On: Best Practices for a BYOD World Chris Vernon CISSP, VTSP Security Specialist Agenda Mobile Threats Overview 2013 State of Mobility Survey Canada BYOD Best Practices 2 Mobile
Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure
Nubo Software's UX over IP brings network efficiency to virtual mobile infrastructure Analyst: Chris Hazelton 24 Aug, 2015 The fact that mobile computing is now displacing a share of 'traditional computing'
The Internet of Things: Trends Westcon Comstor CONNECT. November 2015
The Internet of Things: Trends Westcon Comstor CONNECT November 2015 The Internet of Things Is Coming.. Are You READY?? 2 Agenda Introduction Definitions and Observations Market Trends/Sizing Recommendations/Discussion
Hands on, field experiences with BYOD. BYOD Seminar
Hands on, field experiences with BYOD. BYOD Seminar Brussel, 25 september 2012 Agenda Challenges RIsks Strategy Before We Begin Thom Schiltmans Deloitte Risk Services Security & Privacy Amstelveen [email protected]
How To Manage A Mobile Device Management (Mdm) Solution
Mobile Device Management Buyers Guide IT departments should be perceived as the lubricant in the machine that powers an organization. BYOD is a great opportunity to make life easier for your users. But
Copyright 11/19/2015 Aternity, Inc
1 Aternity Version 9 Every App, Any Device, Any User Welcome! First Look Webinar 2 Please feel free to submit your questions throughout today s presentation via GotoWebinar s Q&A Section If for some reason,
Websense Data Security Solutions
Data Security Suite Data Discover Data Monitor Data Protect Data Endpoint Data Security Solutions What is your confidential data and where is it stored? Who is using your confidential data and how? Protecting
Which is the Right EMM: Enterprise Mobility Management. Craig Cohen - President & CEO Adam Karneboge - CTO
Which is the Right EMM: Enterprise Mobility Management Craig Cohen - President & CEO Adam Karneboge - CTO Mobile is strategic for business Mobile provides a beeer experience Mobile changes the way people
CA Technologies Data Protection
CA Technologies Data Protection can you protect and control information? Johan Van Hove Senior Solutions Strategist Security [email protected] CA Technologies Content-Aware IAM strategy CA Technologies
10 Building Blocks for Securing File Data
hite Paper 10 Building Blocks for Securing File Data Introduction Securing file data has never been more important or more challenging for organizations. Files dominate the data center, with analyst firm
WHITE PAPER Thru for Enterprise File Sync and Sharing
WHITE PAPER Thru for Enterprise File Sync and Sharing 701-4035-7304 www.thruinc.com 2014 Thru, Inc. All rights reserved Table of Contents Introduction...3 Challenges of Mobile Business...4 The Enterprise-Liable
CA Enterprise Mobility Management MSO
SERVICES DESCRIPTION CA Enterprise Mobility Management MSO At a Glance Today, your customers are more reliant on mobile technologies than ever. They re also more exposed by mobile technologies than ever.
White Paper. Data Security. The Top Threat Facing Enterprises Today
White Paper Data Security The Top Threat Facing Enterprises Today CONTENTS Introduction Vulnerabilities of Mobile Devices Alarming State of Mobile Insecurity Security Best Practices What if a Device is
CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT
CDW PARTNER REVIEW GUIDE MOBILE DEVICE MANAGEMENT GETTING CONTROL OF MOBILITY IN THE MARKET In a 2011 IDC study, IT decision-makers report that, on average, 34 percent of their employees access business
Enterprise Mobility Best Practices 2017 Analysts Predictions
Enterprise Mobility Best Practices 2017 Analysts Predictions Sponsored by Fiberlink John Jackson February, 2014 Agenda 1. Enterprise Mobility, the Third Platform, and a 2-3 Year Outlook 2. Mobile Enterprise
While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:
While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab: A copy of today s presentation and our Upcoming webinars Information on how to dial in if
How To Manage A Corporate Device Ownership (Byod) On A Corporate Network (For Employees) On An Iphone Or Ipad Or Ipa (For Non-Usenet) On Your Personal Device
Empowering BYOD and Mobile Security in the Enterprise Jeff Baum, APAC Managing Director Growth of Mobile Mobile worker population will reach 1.3 Billion in 2015 Source: IDC Worldwide Mobile Worker Population
If you can't beat them - secure them
If you can't beat them - secure them v1.0 October 2012 Accenture, its logo, and High Performance delivered are trademarks of Accenture. Preface: Mobile adoption New apps deployed in the cloud Allow access
Mobile Protection. Driving Productivity Without Compromising Protection. Brian Duckering. Mobile Trend Marketing
Driving Productivity Without Compromising Protection Brian Duckering Mobile Trend Marketing Mobile Device Explosion Paves Way for BYOD 39% 69% 340% 2,170% 2010 177M corp PCs 2015 246M corp PCs 2010 173
WINNING THE BYOD GAME
How to Create a Realistic Governance Strategy WINNING THE BYOD GAME Presented by Cask, LLC and Cherwell Software Webinar March 2012 Agenda 2» Introductions» How did we get here?» Where do we start?» Governance
Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media
Enabling Business Beyond the Corporate Network Secure solutions for mobility, cloud and social media 3 Trends Transforming Networks and Security Are you dealing with these challenges? Enterprise networks
Microsoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite March 25, 2015 Colm Whelan VP of Cloud Solutions [email protected] @colmw https://www.linkedin.com/in/colmwhelan Lighthouse Computer Services, All rights reserved
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
Five Best Practices for Secure Enterprise Content Mobility
A N A C C E L L I O N W H I T E P A P E R Five Best Practices for Secure Enterprise Content Mobility Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com
Enterprise Mobile App Management Essentials. Presented by Ryan Hope and John Nielsen
Enterprise Mobile App Management Essentials Presented by Ryan Hope and John Nielsen 1 Mobile App Trends Global mobile app downloads to exceed 30B by 1016 US and Europe account for over 70% of the market
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh. May 20 th, 2013
The Workplace of the Future and Mobile Device Risk ISACA Pittsburgh May 20 th, 2013 Companies are leveraging mobile computing today Three major consumption models: 1. Improving productivity Improving employee
The Future of Enterprise Storage. Simon Robinson Research VP, Storage
The Future of Enterprise Storage Simon Robinson Research VP, Storage 451 Research is an information technology research & advisory company Research & Data Advisory Services Events Founded in 2000 210+
How to Execute Your Next Generation of Mobile Initiatives. Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware
How to Execute Your Next Generation of Mobile Initiatives Ian Evans Vice President and Managing Director- EMEA, AirWatch by VMware Company Facts 12000 1,800 employees 150 countries 17 languages 11 global
AirWatch by VMware lays the groundwork for enterprise mobility in Latin America
AirWatch by VMware lays the groundwork for enterprise mobility in Latin America Analyst: Raúl Castañón-Martínez 15 Dec, 2014 AirWatch by VMware entered the Latin American market in 2011. Since then, it
#ITtrends #ITTRENDS SYMANTEC VISION 2012 1
#ITtrends 1 Strategies for Security and Management in a Mobile and Virtual World Anil Chakravarthy Senior Vice President, Enterprise Security Group 2 MASSIVE INCREASE IN SOPHISTICATED ATTACKS 403 million
MaaSter Microsoft Ecosystem Management with MaaS360. Chuck Brown Jimmy Tsang www.maas360.com
MaaSter Microsoft Ecosystem Management with MaaS360 Chuck Brown Jimmy Tsang www.maas360.com Introductions Chuck Brown Product Management IBM MaaS360 Jimmy Tsang Director of Product Marketing IBM MaaS360
BYOD How-To Guide. How do I securely deliver my company s applications and data to BYOD?
BYOD How-To Guide How do I securely deliver my company s applications and data to BYOD? Table of Contents Harness the power of BYOD with Mobile Workspaces Why BYOD? Enterprise Mobile Requirements Mobile
Cyber Security. John Leek Chief Strategist
Cyber Security John Leek Chief Strategist AGENDA The Changing Business Landscape Acknowledge cybersecurity as an enterprise-wide risk management issue not just an IT issue How to develop a cybersecurity
Agenda. Company Platform Customers Partners Competitive Analysis
KidoZen Overview Agenda Company Platform Customers Partners Competitive Analysis Our Vision Power the backend of the post- web enterprise Key Challenges of the Mobile Enterprise Enterprise systems integration
Comprehensive Security with Splunk and Cisco
Copyright 2014 Splunk Inc. Comprehensive Security with Splunk and Cisco Mario MASSARD Splunk Senior SE [email protected] Company Company (NASDAQ: SPLK) Founded 2004, first software release in 2006 HQ: San
How To Protect Your Mobile Devices From Security Threats
Back to the Future: Securing your Unwired Enterprise By Manoj Kumar Kunta, Global Practice Leader - Security Back to the Future: Securing your Unwired Enterprise The advent of smartphones and tablets has
How To Use An Android Phone With A Microsoft Powerbook 2.5 (Ios) And A Microsatellite (Xen Mobile) Device (For A Free Download) For A Business
XenMobile MDM and The Mobile Solutions Bundle Jaan Feldmann Sergei Sokolov How Mobile Feels Today User Needs Freedom to access all their apps and data from any of their devices For Enterprise IT, mobile
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access
Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access Vikas Jain Director, Product Management Intel Corporation Jesper Tohmo CTO, Nordic Edge (an Intel company) Session ID:
EMPOWERING THE DYNAMIC WORKPLACE
EMPOWERING THE DYNAMIC WORKPLACE Matrix42 has been positioned in the visionary quadrant of the Gartner Magic Quadrant as the only vendor that enables organizations to manage physical, virtual and mobile
Symantec Endpoint Security Management Solutions Presentation and Demo for:
Symantec Endpoint Security Management Solutions Presentation and Demo for: University System of Georgia Board of Regents Information Technology Services Executive Summary Business Requirements To migrate
The Cloud App Visibility Blindspot
The Cloud App Visibility Blindspot Understanding the Risks of Sanctioned and Unsanctioned Cloud Apps and How to Take Back Control Introduction Today, enterprise assets are more at risk than ever before
SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES
SAFELY ENABLING MICROSOFT OFFICE 365: THREE MUST-DO BEST PRACTICES Netskope 2015 Enterprises are rapidly adopting Microsoft Office 365. According to the Netskope Cloud Report, the suite is among the top
Cloud, security and the mobile enterprise: An end-to-end manageability challenge
GreHack-2012 19 th October, Grenoble France Cloud, security and the mobile enterprise: An end-to-end manageability challenge Boris Balacheff Dave Penkler seamless, secure, context-aware experiences for
A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012
A COALFIRE PERSPECTIVE Moving to the Cloud A Summary of Considerations for Implementing Cloud Migration Plans into New Business Platforms NCHELP Spring Convention Panel May 2012 DALLAS DENVER LOS ANGELES
White Paper. Protecting Mobile Apps with Citrix XenMobile and MDX. citrix.com
Protecting Mobile Apps with Citrix XenMobile and MDX citrix.com Mobility is a top priority for organizations as more employees demand access to the apps and data that will make them productive. Employees
Mobile App Management:
Mobile App Management: What Symantec App Center can do for mobile productivity Brian Duckering Mobile Trend Marketing What is Mobile App Management? Generic: App-specific management Lifecycle management
Oracle RightNow Cloud Service Mobile Agent Solution. Prepared for MUG, Dec 2013. Jason Davis, Sr. Principal, Product Mgmt
Oracle RightNow Cloud Service Mobile Agent Solution Prepared for MUG, Dec 2013. Jason Davis, Sr. Principal, Product Mgmt Agenda Mobile Trends Oracle Service Cloud Mobile Agent Solution Overview Solution
Cloud Security: Is It Safe To Go In Yet?
Cloud Security: Is It Safe To Go In Yet? Execu1ve Breakfast Roundtable June 22, 2011 Boston Chapter WAY TO GO BRUINS! Welcome, Introduc4ons AGENDA Legal Perspec4ve, Bingham McCutchen Break Featured Speakers
Healthcare Buyers Guide: Mobile Device Management
Healthcare Buyers Guide: Mobile Device Management Physicians and other healthcare providers see value in using mobile devices on the job. BYOD is a great opportunity to provide better and more efficient
Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci www.deepsecurity.us
Emerging threats for the healthcare industry: The BYOD Revolution By Luca Sambucci www.deepsecurity.us Copyright 2013 Emerging threats for the healthcare industry: The BYOD REVOLUTION Copyright 2013 Luca
trends and audit considerations
Bring your own device (BYOD) trends and audit considerations SIFMA IT audit session 4 October 2012 Disclaimer Ernst & Young refers to the global organization of member firms of Ernst & Young Global Limited,
Practical Enterprise Mobility
Practical Enterprise Mobility Authored by Sponsored by Introduction In the traditional IT model of a few years ago, when the employees of a company needed to access an enterprise application or business
Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview
Websense Data Security Gateway and Citrix NetScaler SDX Platform Overview 2 The next generation of SDX platform provides the foundation for further integration. Today, Citrix NetScaler SDX appliances enable
BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size.
April 2014 BYOD Guidelines A practical guide for implementing a successful BYOD Management program in an organization of any size. Bring your own device (BYOD) refers to the policy of permitting employees
Productive and Secure Enterprise Mobility with Cisco and Citrix
Productive and Secure Enterprise Mobility with Cisco and Citrix Cisco Workspace Solution with Citrix: A Comprehensive Mobility Infrastructure Solution A Compelling Productivity Imperative Modern workers
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
TRG Clients in the Cloud Today
Understanding Your Cloud Options for Microsoft Dynamics GP Presented by: Brady Curtis Building Now for Your Future TRG Clients in the Cloud Today Cloud 5% On Prem 95% Building Now For Your Future RG Connect
The top five enterprise mobility management vendors: product focus and financials
The top five enterprise mobility management vendors: product focus and financials Analyst: Chris Hazelton 21 Apr, 2015 Enterprise mobility management (EMM) is becoming a big business, but who are the biggest
Secure mobility with Citrix & Cisco
Secure mobility with Citrix & Cisco Enterprise IT resources on tablets and smartphones BYOD & Mobile Networks Damjan Mirtic Citrix South East Europe 1.3 Billion Mobile workers by 2015 Mobile Worker Population
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA
HYBRID CLOUDS DEFINING A SUSTAINABLE STRATEGY DR. RAGHU P. PUSHPAKATH KRISHNAKUMAR GOPINATHAN SACHIN KANOTH MADAKKARA Executive Summary While a number of organizations are gaining experience and increased
Classify, Protect, Audit: New Approach to SAP Data Security. Aparna Jue, SECUDE
Classify, Protect, Audit: New Approach to SAP Data Security Aparna Jue, SECUDE About SECUDE SECUDE is an innovarve global provider of IT data protecron solurons for SAP customers. Our user- friendly solurons
White Paper. Data Security. journeyapps.com
White Paper Data Security CONTENTS The JourneyApps Commitment to Security Geographic Location of Cloud Hosting Infrastructure-Level Security Protection of Data Through Encryption Data Life Cycle Management
EOH Cloud Mobile Device Management. EOH Cloud Services - EOH Cloud Mobile Device Management
EOH Cloud EOH Cloud Services - EOH Cloud Page 1 EOH Mobile Device Management Manage a fleet of diverse mobile devices, support new secure mobile workflows and effectively distribute apps. The evolving
EasiShare Whitepaper - Empowering Your Mobile Workforce
Accessing files on mobile devices and sharing them with external parties presents serious security risks for companies. However, most current solutions are either too cumbersome or not secure enough for
Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight
Building Secure Mobile Applications Using MaaS360 SDK and IBM Worklight Karthik Ramgopal/Paras Segal [email protected] [email protected] www.maas360.com Why Mobile Applications are a Must? Rising
Bruce Allison. Steve Moran
Bruce Allison Steve Moran ASK A QUESTION POST A COMMENT SUBMIT TECHNICAL QUERIES SHARE YOUR TIPS PROVIDE FEEDBACK DIAL IN AND LISTEN VIA YOUR TELEPHONE! 1800 896 323 81178679# Virtual Desktops A simple,
NextLabs Rights Management Platform
KuppingerCole Report EXECUTIVE VIEW by Martin Kuppinger October 2015 Comprehensive Rights Management solution including information classification, based on a well thought-out policy management model supporting
IT Self Service and BYOD Markku A Suistola
IT Self Service and BYOD Markku A Suistola Principal Presales Consultant Why IT Service need to evolve? David Coyle, research vice president at Gartner, 2010**: "IT self-service is a great concept, enabling
Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce
Sichere bewegliche Arbeitskräfte Trend Micro Safe Mobile Workforce Richard Javet, Partner Business Manager Gabriel Kälin, Technical Consultant Trend Micro Schweiz, August 2014 8/27/2014 Copyright 2013
IT Resource Management vs. User Empowerment
Mobile Device Management Buyers Guide IT Resource Management vs. User Empowerment Business leaders and users are embracing mobility and enjoying the flexibility and productivity leading to rising mobile
