Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center
Jeff Stork - Software Delivery Practice Manager
Jeff Stork
Senior Service Manager
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC, Solutions and Services
»See All Authors


We have searched the depths of our blog to provide you with the latest IT articles on BYOD. Get Connected Today!
Network Security

A Security-Positive Culture Starts at the Top

Get actively involved to build a culture of security in your business

by Stephen Nardone | 10.17.16

Cybersecurity is vital to every area of your organization. IT officers, corporate officers, finance directors, and human resources managers should all play a role in designing a living, breathing security plan to protect their business. But how do you create a culture of responsible, effective security practices and meaningful threat awareness? Read on to find out.

Tags:Business-ContinuityBYODCyber AwarenessCybersecurityDisaster Recovery

Cyber Security

Stop. Think. Connect.

And Protect!

by Stephen Nardone | 10.03.16

This October is once again National Cyber Security Awareness month and also the sixth anniversary of “Stop. Think. Connect.” the national cybersecurity education and awareness campaign. While targeted at the general public, the campaign is of equal—if not greater—relevance to IT and InfoSec pros.

Tags:BYODConnectionCyber AwarenessCybersecurityDevicesInternetITMalwareMobilityNational Cyber Security Awareness MonthSoftwareSymantec

Developing Your Mobile Strategy

Overlook Enterprise Connectivity at Your Own Risk

by Stephen Nardone | 09.16.16

Just as the security ecosystem of an organization is dependent on the sensitive data that they are trying to protect, so too does an enterprise’s mobile strategy depend on the end goals of the business. Each organization will have its own mobile strategy that is a product of thoughtful input from not only IT, LOB managers, and CIOs but also security professionals.

Tags:BYODConnectionITMobile Device ManagementMobile devicesMobilityNetworkNetworking

Cybersecurity Best Practices

Best Practices to Improve Cybersecurity

They May Be Simpler than You Think

by Stephen Nardone | 07.06.16

The threat environment—i.e. malware and zero-day attacks, drive-by downloads, watering hole attacks, and denial and distributed denial of service (DoS/DDoS) attacks—is worsening, and the news and analyses paint a dismal picture for cybersecurity: it’s not a case of if you’ll be attacked, but when. However, making your environment more secure—and if not eliminating, at least drastically reducing your risk—is achievable by implementing the appropriate policies, practices and technologies.

Tags:BYODCybersecurityDoSHIPAAHITECHIDCMalwareNetwork VirtualizationPCISDNSecurity breachesSecurity SolutionsSecurity-Policies

Dell Partner Direct Premier Healthcare IT

Mobility, Data, and Security in Healthcare

Take Endpoint Security to a New Level

by Bill Virtue | 04.27.16

Mobile productivity continues to be a rising demand in healthcare as doctors, nurses, medical students, and other healthcare professionals need access to patient data. And health organizations must also address the fact that many healthcare professionals want to use their own devices to access this data. To balance mobile device productivity with patient privacy, endpoint security and compliance are critical for every healthcare organization.

Tags:BYODComplianceConnectionEndpoint SecurityMobility SolutionsPodcast

Follow Us
RSS Feed
Featured Bloggers
Stephen Nardone - Director of Security Solutions and Services
Practice Director, Security and Mobility
Kevin O'Connor - Senior Director, Cloud Solutions Group
Senior Director, Cloud Solutions Group
Bill Virtue - Senior Partner Development Specialist
Senior Partner Development Specialist - Dell
Tag Cloud
Loading Loading...