|By Business Wire||
|February 24, 2014 01:00 AM EST||
AdaptiveMobile, the world leader in mobile security, reveals that almost 70% of European and US employees would stop using their own device for work purposes if they knew their employer could remotely wipe or lock it, highlighting concerns over an infringement of privacy.
The study of 1,000 IT decision makers and 1,000 employees, conducted by Harris Interactive, found that 83% of staff would stop using their own device or still use it with deep concern, if they knew their employer could see what they were doing at all times. With 61% of enterprises already having this level of access in place, and with a need to increase control to address growing security threats - organisations could face a backlash in their employees’ willingness to adopt BYOD.
Gareth Maclachlan, Chief Commercial Officer, AdaptiveMobile comments: "Over 75% of enterprises surveyed were unable to meet 8 out of 10 of their current top security requirements; when this is combined with the fact that only 11% of employees are aware of the current level of enterprise control over their device, it is imperative that other ways of delivering mobile protection are considered. Without a new approach to mobile security, employers risk losing the savings they would accrue with BYOD remaining responsible for providing the devices and connectivity to all employees.”
There is also a clear disconnect between employee awareness of employer policies - 91% of businesses believe they have policies in place to protect against mobile security breaches but almost half (48%) of employees already using their own device, are unaware these policies exist.
This growing chasm between employer and employee has created the opportunity for a new approach to enterprise security - with over 75% of employees endorsing their operator as being able to bridge the gap and protect both parties. Employers agree, with 72% stating they would buy a Mobile Security Management service from their operator, and 65% saying they would switch operators to get an effective solution.
Maclachlan concludes: “To prevent employees rejecting BYOD and maintaining control over their personal device and usage, a solution is needed that maintains user privacy, whilst also keeping the enterprise free from exposure. A hosted security service, delivered via operators, would give employees peace-of-mind that their own usage is protected, whilst still giving enterprise administrators complete control over corporate access, usage and integrity.”
AdaptiveMobile is the world leader in mobile security, protecting over one billion consumer and enterprise subscribers worldwide, and the only mobile security company offering products designed to protect all the services on fixed, wi-fi and mobile networks. AdaptiveMobile’s award-winning security products provide customers with real-time visibility into what is happening across their networks and the actionable intelligence to respond to these threats. Scaling from the largest global service providers down to the individual user, AdaptiveMobile offers the most comprehensive mobile security products available on the market today; as well as sophisticated revenue-generating security services – empowering consumers and enterprises alike to take greater control of their own mobile security. www.adaptivemobile.com
Container technology is shaping the future of DevOps and it’s also changing the way organizations think about application development. With the rise of mobile applications in the enterprise, businesses are abandoning year-long development cycles and embracing technologies that enable rapid development and continuous deployment of apps. In his session at DevOps Summit, Kurt Collins, Developer Evangelist at Built.io, examined how Docker has evolved into a highly effective tool for application del...
Nov. 26, 2015 07:00 PM EST Reads: 325
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Nov. 26, 2015 04:00 PM EST Reads: 377
The cloud. Like a comic book superhero, there seems to be no problem it can’t fix or cost it can’t slash. Yet making the transition is not always easy and production environments are still largely on premise. Taking some practical and sensible steps to reduce risk can also help provide a basis for a successful cloud transition. A plethora of surveys from the likes of IDG and Gartner show that more than 70 percent of enterprises have deployed at least one or more cloud application or workload. Y...
Nov. 26, 2015 03:30 PM EST Reads: 442
Internet of @ThingsExpo, taking place June 7-9, 2016 at Javits Center, New York City and Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 18th International @CloudExpo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo New York Call for Papers is now open.
Nov. 26, 2015 03:30 PM EST Reads: 523
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York and Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty ...
Nov. 26, 2015 03:15 PM EST Reads: 518
We are rapidly moving to a brave new world of interconnected smart homes, cars, offices and factories known as the Internet of Things (IoT). Sensors and monitoring devices will touch every part of our lives. Let's take a closer look at the Internet of Things. The Internet of Things is a worldwide network of objects and devices connected to the Internet. They are electronics, sensors, software and more. These objects connect to the Internet and can be controlled remotely via apps and programs. ...
Nov. 26, 2015 02:15 PM EST Reads: 498
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, explored the IoT cloud-based platform technologies driving t...
Nov. 26, 2015 01:00 PM EST Reads: 391
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
Nov. 26, 2015 01:00 PM EST Reads: 290
We all know that data growth is exploding and storage budgets are shrinking. Instead of showing you charts on about how much data there is, in his General Session at 17th Cloud Expo, Scott Cleland, Senior Director of Product Marketing at HGST, showed how to capture all of your data in one place. After you have your data under control, you can then analyze it in one place, saving time and resources.
Nov. 26, 2015 12:00 PM EST Reads: 148
As organizations shift towards IT-as-a-service models, the need for managing & protecting data residing across physical, virtual, and now cloud environments grows with it. CommVault can ensure protection & E-Discovery of your data - whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise.
Nov. 26, 2015 11:30 AM EST Reads: 121
In recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Sam McIntyre, Partner Enablement Specialist at eFolder, presented how organizations can use eFolder Cloudfinder to automate backups of cloud application data. He also demonstrated how easy it is to search and restore cloud application data using Cloudfinder.
Nov. 26, 2015 11:00 AM EST Reads: 124
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Nov. 26, 2015 11:00 AM EST Reads: 445
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
Nov. 26, 2015 10:00 AM EST Reads: 287
DevOps is about increasing efficiency, but nothing is more inefficient than building the same application twice. However, this is a routine occurrence with enterprise applications that need both a rich desktop web interface and strong mobile support. With recent technological advances from Isomorphic Software and others, rich desktop and tuned mobile experiences can now be created with a single codebase – without compromising functionality, performance or usability. In his session at DevOps Su...
Nov. 26, 2015 09:45 AM EST Reads: 370
As organizations realize the scope of the Internet of Things, gaining key insights from Big Data, through the use of advanced analytics, becomes crucial. However, IoT also creates the need for petabyte scale storage of data from millions of devices. A new type of Storage is required which seamlessly integrates robust data analytics with massive scale. These storage systems will act as “smart systems” provide in-place analytics that speed discovery and enable businesses to quickly derive meaningf...
Nov. 26, 2015 09:30 AM EST Reads: 376