Articles
Articles
VDI and Virtual Desktop Security
-
What's the role of mobile anti-malware? Currently there are more questions than answers.
Whenever mobile malware is in the news (which is pretty often), questions always come up about the role of anti-malware in enterprise mobility management environments. The problem is there's not very much consensus on mobile anti-malware, and there ... Continue Reading
-
AirWatch announces app reputation scanning service, but leaves room for Appthority and Veracode.
This week AirWatch announced that they have developed their own app reputation scanning service. Continue Reading
-
If you have to back up client devices, you're doing something wrong
At TechTarget's Storage Decisions conference last week in San Francisco, one of the attendees asked me, "What's the best backup solution for mobile devices?" What was weird about that question is that I didn't have a quick answer. Continue Reading
-
Want to secure BYOC/BYOD? Just assume bad guys are recording everything.
At one of our our TechTarget Desktop Virtualization 2013 seminars in San Francisco last week, an attendee asked me about whether it's possible to ensure that BYOD / BYOC devices haven't been rooted and/or compromised. The answer? Continue Reading
-
Having trouble getting budget to deal with consumerization? Create a "FUIT book of Anecdotes!"
One of the most common challenges I hear from people is that they have a hard time convincing the higher ups and their companies that consumerization is real and something they have to deal with. Continue Reading
-
You think VDI is more secure than traditional desktops? It's not. You're wrong.
Despite what people have liked to say, VDI isn't anymore secure than traditional desktops. Time to put that myth to rest. Continue Reading
-
How will you manage XP after April 8, 2014 for those situations where you just have to have it?
Enough with the warnings about April 8th, 2014 and how it's irresponsible to think that you can continue run Windows XP because it just works. Tim Rains of the Trustworthy Computing team at TechNet put up a great post about the dangers of running XP... Continue Reading
-
My new book, Enterprise Mobility Management: Everything you need to know about MDM, MAM, and BYOD!
I've very happy to announce that my new book, Enterprise Mobility Management: Everything you need to know about MDM, MAM, and BYOD, is available today. This book is an in-depth examination and overview of the mobility topics I write about here at ... Continue Reading
-
IT isn't worried about "data leakage." Thanks to Consumerization, IT is hoping for "data ingestion!"
In today's world, enterprise data isn't in the enterprise. It's created with a camera, Google Docs, or Evernote. Continue Reading
-
Could VMCS Shadowing (a.k.a. nested VMs) from Intel's new Haswell processors be what Bromium needs?
Over the last few months, details have been trickling out about Intel's latest processor family, Haswell. Just this week, pricing information was leaked for desktop and mobile processors, and we've also seen feature charts and some benchmarks on ... Continue Reading
-
The delta between work and consumer capabilities is where "FUIT" happens. Luckily we're past that!
While we do live in a new era of consumerization, the hard part-which was making the transition from the pre consumerization era into our current era-is over, and life should be easier for us now. Continue Reading
-
"Compliance" doesn't make you secure, it keeps you out of jail. Security keeps you out of the news.
Two of the big areas of concern around the consumerization of IT and BYOD are security and compliance. Whenever I start talking about users being able to do whatever they want, or users bringing in their own devices, people in the audience ... Continue Reading
-
Rethinking network security: all your on-premises WiFi users are actually "remote" users
Last week I spoke at TechTarget's Modern Infrastructure Decisions conference in New York City. My topic was about the Consumerization of IT, specifically ten things you can do to start to address consumerization in your organization. Continue Reading
-
Check out this must-read post on TechCrunch about how startups are replacing old-guard ISVs
Over the weekend, Box CEO and co-founder Aaron Levie wrote a blog post on TechCrunch called "The Changing Of The Enterprise Guard." It is a must-read for anyone in our industry, and it gets me excited that I'm part of this hot space even though my ... Continue Reading
-
Considering mobile app management? You should know about app immune systems from Metaforic.
Last week I had a conversation with Dan Stickel, CEO of Metaforic. Metaforic is the creator of an "app immune system" product that's designed to keep apps safe from attacks, regardless of the state of the environment in which they're running. Continue Reading