James Nagurney - National Business Development Manager
James Nagurney
National Business Development Manager
Kurt Hildebrand - Director of Practices and Initiatives for Enterprise Storage
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Rich Faille - Director of Mobility Practice
Rich Faille
Director of the Mobility Practice
Tony D'Ancona - Vice President of Professional Services
Tony D'Ancona
Vice President of Professional Services
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More
Sort by: Relevance Date
Found 46 posts matching the search term "security".
BYOD Security

BYOD, Security, and You

Make Sure You Cover All Your Bases

by Rich Faille | 09.06.13

By now, you’re probably well aware of the growing trend of BYOD and how important it is to put a security plan in place for the employee-owned devices that will be accessing your organization’s network and data. Read on, and I’ll give you a rundown of five things to make sure you consider before you begin to implement BYOD at your organization. 

Tags:BYOD

Data Center Servers

Overcome Your Cloud Security Woes

Cisco and Intel Are Here to Help

by Justin Zuill | 10.24.13

There is no one-size-fits-all version of cloud technology when it comes to real-world applications. Cloud computing technologies are like raw materials that you can combine in multiple ways to achieve your desired business outcomes. Like many IT professionals, you’re probably considering cloud computing in your organization, but you’re also worried about keeping your data and assets secure.

Tags:Cloud ComputingSecurity

Infrared Security Image - Securing Your BYOD Environment

Security: The Biggest BYOD Challenge

You Can Keep Your Data Safe and Your Employees Happy

by Rich Faille | 04.11.14

Obviously, security is a very big concern for organizations as they begin to implement a bring your own device (BYOD) strategy. Many IT managers fear a loss of company or client data, unauthorized access to the network, and malware infections. They may also lack the resources needed to properly address these security concerns. We’re here to share some tips and strategies to ensure your data remains secure as you implement a BYOD policy.

Tags:BYODMobilitySecurity

When Microsoft abandons ship on Windows XP support on April 8, 2014, it will not be patching security holes, which means your Internet-connected computer will be a defenseless piece of hardware that is fair game for malicious software attacks.

While Microsoft has offered anti-malware signature support until July 14, 2015, that is not a commitment to extend security support for XP. Microsoft will continue to provide updates to its XP anti-malware software, including Microsoft Security Essentials, in order to detect some forms of malware. But working on an outdated OS means it will have limited effectiveness, the company concedes.

Tags:MicrosoftSecuritySoftwareWindows 8

Securing BYOD with Mobile Device Management (MDM) Solution

BYOD Is Here to Stay In the Classroom

Got MDM Security?

by Chris Roux | 12.10.13

Traditionally, textbooks have steered classroom curriculum. But over the last few years, BYOD has changed the direction of teaching. More and more, students are turning on their tablets, iPhones, and notebooks to research relevant topics. BYOD is coming of age in many classrooms, creating greater learning opportunities, and changing the educational landscape. Caution is needed, because with this new mobile makeover come security challenges. 

Tags:BYODEducational InstitutionMobilitySecurity