|By PR Newswire||
|January 10, 2014 07:00 AM EST||
LAS VEGAS, Jan. 10, 2014 /PRNewswire/ -- One of the hottest IT policies among enterprises, Bring Your Own Device (BYOD) has gained sustained momentum and increasing popularity around the world over the past year. According to Gartner's prediction by 2017, about half of the world's companies will enact BYOD programs and will no longer provide computing devices to employees. While BYOD brings tremendous benefits to both individual employees and companies at large, it also brings about challenges and concerns, such as security risks, that hinder its prevalence.
(Infographic: http://photos.prnewswire.com/prnh/20140110/CN44159-INFO )
According to a survey conducted by IDC, 61% of enterprises adopting BYOD consider mobile security as their top security concern. Such mobile security concerns are mainly focused on three core aspects: identity, privacy, and compliance. To address these concerns, Huawei launched the AnyOffice Mobile Security Solution -- a vulnerability-free mobile security solution that offers ubiquitous security features, covering a full spectrum of mobile elements, including devices, networks, as well as services and management.
Identity: Effective Authentication and Access Control
Huawei's AnyOffice Mobile Security Solution adopts refined, flexible security authentication and access control policies for user and mobile device identification. By adopting a "5W1H" (Who, Whose Device, What Device, Where, When, and How) matching approach, the solution helps enterprise IT management verify user identity authentication based on individual users, user groups, bandwidth usage, priorities, access time, or network zones. This helps enterprises effectively prevent unauthorized user access or resource misuse, mitigate regulation breach caused by network misuse, minimize information leakage, and protect enterprise core information assets.
Privacy: Ensuring Secure Data Usage, Storage and Transmission
Privacy has been a key consideration for BYOD adoption among companies. Leveraging advanced technologies, the Huawei AnyOffice Mobile Security Solution helps enterprises mitigate privacy concerns by ensuring secure data usage, storage and transmission. For instance, by adopting unique sandboxing technology, the solution separates encrypted corporate applications and data from those of individual users. In addition, in the event when a mobile device is lost or misplaced, the device owner can remotely wipe all data from the device using the Mobile Device Management (MDM) technology empowered by the solution. To ensure secure data transmission, the solution features Layer 3 Virtual Private Network (L3 VPN) and Layer 4 Virtual Private Network (L4 VPN) protection technologies, providing network-layer and application-layer encrypted tunnels respectively, which help to fend off interceptions, tampers and other threats during data transmission.
Compliance: Regulations throughout Mobile Devices Lifecycle
Another key factor triggering security risks when a company goes mobile is policy compliance. Huawei's AnyOffice Mobile Security Solution adopts leading regulatory compliance technologies, which enable establishment of comprehensive compliance management regulations. This ensures that mobile devices are compliant with regulations throughout an Acquire-Deploy-Run-Retire device lifecycle, as defined by the company.
Successful Implementation Reduces Costs and Enhances Operational Efficiency
Huawei, a leading global information and communications technology (ICT) solutions provider has been experiencing fast business growth and rapid global expansion over the past few years. Amidst the rapid expansion, Huawei has been facing challenges brought about by its core IT systems. In order to reduce response time and improve operational efficiency of IT systems, Huawei introduced the initial phase of its self-developed BYOD program in 2009. With the implementation of the Huawei's AnyOffice Mobile Security Solution, about 30,000 employees have enjoyed secure global mobile office operations by the end of 2013. This greatly improved average operational efficiency by up to 37 minutes per day, which translated into over US$10 million savings every year. The centralized mobile security management featured in the solution also helped mitigate IT maintenance pressure, resulting in reduced IT operational costs.
Since 2009, Huawei has been rolling out its BYOD program across the whole company, aiming to enhance operational efficiency and eliminate security concerns. According to Huawei's latest BYOD adoption timeline, over 80 percent of Huawei's 150000 employees will be enjoying BYOD by the end of 2015, which is expected to generate a significant increase in cost savings and further enhance the company's productivity.
Constant Changes Ahead
In an era where the evolution of mobile technologies and applications are inevitable, enterprises will need to remain open to the adoption of innovative technologies and undergo constant internal technological enhancements. Foreseeable changes in mobile technologies include device virtualization, emergence of explicit security ratings, shift from BYOD to Bring Your Own Application (BYOA), as well as a focus on Mobile Application Management and Mobile Content Management. To enable seamless management and maintenance of mobile applications and security, Huawei will continue to offer customer-centric one-stop mobile security and virtualization solutions and services, empowering enterprise customers with more flexible and efficient operations, without security concerns.
 "Half of Companies Will Require BYOD By 2017, Gartner Says", CIO, May 1, 2013: http://www.cio.com/article/732649/Half_of_Companies_Will_Require_BYOD_By_2017_Gartner_Says?source=cio_top5
 IDC Asia/Pacific Future Workspace Study, May 2013
All clouds are not equal. To succeed in a DevOps context, organizations should plan to develop/deploy apps across a choice of on-premise and public clouds simultaneously depending on the business needs. This is where the concept of the Lean Cloud comes in - resting on the idea that you often need to relocate your app modules over their life cycles for both innovation and operational efficiency in the cloud. In his session at @DevOpsSummit at19th Cloud Expo, Valentin (Val) Bercovici, CTO of Soli...
Feb. 22, 2017 10:45 PM EST Reads: 536
"We're bringing out a new application monitoring system to the DevOps space. It manages large enterprise applications that are distributed throughout a node in many enterprises and we manage them as one collective," explained Kevin Barnes, President of eCube Systems, in this SYS-CON.tv interview at DevOps at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Feb. 22, 2017 09:45 PM EST Reads: 6,647
SYS-CON Events announced today that CA Technologies has been named "Platinum Sponsor" of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, New York, and 21st International Cloud Expo, which will take place in November in Silicon Valley, California.
Feb. 22, 2017 08:45 PM EST Reads: 1,805
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
Feb. 22, 2017 08:45 PM EST Reads: 1,344
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
Feb. 22, 2017 08:45 PM EST Reads: 1,268
Extreme Computing is the ability to leverage highly performant infrastructure and software to accelerate Big Data, machine learning, HPC, and Enterprise applications. High IOPS Storage, low-latency networks, in-memory databases, GPUs and other parallel accelerators are being used to achieve faster results and help businesses make better decisions. In his session at 18th Cloud Expo, Michael O'Neill, Strategic Business Development at NVIDIA, focused on some of the unique ways extreme computing is...
Feb. 22, 2017 07:45 PM EST Reads: 7,783
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
Feb. 22, 2017 07:30 PM EST Reads: 1,170
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
Feb. 22, 2017 06:30 PM EST Reads: 7,476
Every successful software product evolves from an idea to an enterprise system. Notably, the same way is passed by the product owner's company. In his session at 20th Cloud Expo, Oleg Lola, CEO of MobiDev, will provide a generalized overview of the evolution of a software product, the product owner, the needs that arise at various stages of this process, and the value brought by a software development partner to the product owner as a response to these needs.
Feb. 22, 2017 06:15 PM EST Reads: 1,517
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
Feb. 22, 2017 05:45 PM EST Reads: 1,378
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
Feb. 22, 2017 04:45 PM EST Reads: 948
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
Feb. 22, 2017 04:30 PM EST Reads: 1,081
In the first article of this three-part series on hybrid cloud security, we discussed the Shared Responsibility Model and examined how the most common attack strategies persist, are amplified, or are mitigated as assets move from data centers to the cloud. Today, we’ll look at some of the unique security challenges that are introduced by public cloud environments. While cloud computing delivers many operational, cost-saving and security benefits, it takes place in a public, shared and on-demand ...
Feb. 22, 2017 04:00 PM EST Reads: 1,504
In his session at @ThingsExpo, Sudarshan Krishnamurthi, a Senior Manager, Business Strategy, at Cisco Systems, will discuss how IT and operational technology (OT) work together, as opposed to being in separate siloes as once was traditional. Attendees will learn how to fully leverage the power of IoT in their organization by bringing the two sides together and bridging the communication gap. He will also look at what good leadership must entail in order to accomplish this, and how IT managers ca...
Feb. 22, 2017 03:45 PM EST Reads: 1,528
Feb. 22, 2017 03:00 PM EST Reads: 10,410