|By Business Wire||
|February 24, 2014 01:00 AM EST||
AdaptiveMobile, the world leader in mobile security, reveals that almost 70% of European and US employees would stop using their own device for work purposes if they knew their employer could remotely wipe or lock it, highlighting concerns over an infringement of privacy.
The study of 1,000 IT decision makers and 1,000 employees, conducted by Harris Interactive, found that 83% of staff would stop using their own device or still use it with deep concern, if they knew their employer could see what they were doing at all times. With 61% of enterprises already having this level of access in place, and with a need to increase control to address growing security threats - organisations could face a backlash in their employees’ willingness to adopt BYOD.
Gareth Maclachlan, Chief Commercial Officer, AdaptiveMobile comments: "Over 75% of enterprises surveyed were unable to meet 8 out of 10 of their current top security requirements; when this is combined with the fact that only 11% of employees are aware of the current level of enterprise control over their device, it is imperative that other ways of delivering mobile protection are considered. Without a new approach to mobile security, employers risk losing the savings they would accrue with BYOD remaining responsible for providing the devices and connectivity to all employees.”
There is also a clear disconnect between employee awareness of employer policies - 91% of businesses believe they have policies in place to protect against mobile security breaches but almost half (48%) of employees already using their own device, are unaware these policies exist.
This growing chasm between employer and employee has created the opportunity for a new approach to enterprise security - with over 75% of employees endorsing their operator as being able to bridge the gap and protect both parties. Employers agree, with 72% stating they would buy a Mobile Security Management service from their operator, and 65% saying they would switch operators to get an effective solution.
Maclachlan concludes: “To prevent employees rejecting BYOD and maintaining control over their personal device and usage, a solution is needed that maintains user privacy, whilst also keeping the enterprise free from exposure. A hosted security service, delivered via operators, would give employees peace-of-mind that their own usage is protected, whilst still giving enterprise administrators complete control over corporate access, usage and integrity.”
AdaptiveMobile is the world leader in mobile security, protecting over one billion consumer and enterprise subscribers worldwide, and the only mobile security company offering products designed to protect all the services on fixed, wi-fi and mobile networks. AdaptiveMobile’s award-winning security products provide customers with real-time visibility into what is happening across their networks and the actionable intelligence to respond to these threats. Scaling from the largest global service providers down to the individual user, AdaptiveMobile offers the most comprehensive mobile security products available on the market today; as well as sophisticated revenue-generating security services – empowering consumers and enterprises alike to take greater control of their own mobile security. www.adaptivemobile.com
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 5, 2015 02:30 PM EDT Reads: 1,366
The basic integration architecture, as defined by ESBs, hasn’t changed for more than a decade. Most cloud integration providers still rely on an ESB architecture and their proprietary connectors. As a result, enterprise integration projects suffer from constraints of availability and reliability of these connectors that are not re-usable across other integration vendors. However, the rapid adoption of APIs and almost ubiquitous availability of APIs amongst most SaaS and Cloud applications are ra...
Jul. 5, 2015 02:30 PM EDT Reads: 1,133
In his session at 16th Cloud Expo, Simone Brunozzi, VP and Chief Technologist of Cloud Services at VMware, reviewed the changes that the cloud computing industry has gone through over the last five years and shared insights into what the next five will bring. He also chronicled the challenges enterprise companies are facing as they move to the public cloud. He delved into the "Hybrid Cloud" space and explained why every CIO should consider ‘hybrid cloud' as part of their future strategy to achie...
Jul. 5, 2015 02:30 PM EDT Reads: 1,391
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet condit...
Jul. 5, 2015 02:30 PM EDT Reads: 1,842
Containers are revolutionizing the way we deploy and maintain our infrastructures, but monitoring and troubleshooting in a containerized environment can still be painful and impractical. Understanding even basic resource usage is difficult – let alone tracking network connections or malicious activity. In his session at DevOps Summit, Gianluca Borello, Sr. Software Engineer at Sysdig, will cover the current state of the art for container monitoring and visibility, including pros / cons and liv...
Jul. 5, 2015 02:15 PM EDT Reads: 1,483
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at DevOps Summit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
Jul. 5, 2015 02:00 PM EDT Reads: 1,326
"We have a tagline - "Power in the API Economy." What that means is everything that is built in applications and connected applications is done through APIs," explained Roberto Medrano, Executive Vice President at Akana, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 5, 2015 01:30 PM EDT Reads: 1,473
WebRTC converts the entire network into a ubiquitous communications cloud thereby connecting anytime, anywhere through any point. In his session at WebRTC Summit,, Mark Castleman, EIR at Bell Labs and Head of Future X Labs, will discuss how the transformational nature of communications is achieved through the democratizing force of WebRTC. WebRTC is doing for voice what HTML did for web content.
Jul. 5, 2015 01:00 PM EDT Reads: 1,210
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
Jul. 5, 2015 01:00 PM EDT Reads: 2,344
While DevOps most critically and famously fosters collaboration, communication, and integration through cultural change, culture is more of an output than an input. In order to actively drive cultural evolution, organizations must make substantial organizational and process changes, and adopt new technologies, to encourage a DevOps culture. Moderated by Andi Mann, panelists discussed how to balance these three pillars of DevOps, where to focus attention (and resources), where organizations migh...
Jul. 5, 2015 01:00 PM EDT Reads: 2,279
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, reviewed the current landscape of...
Jul. 5, 2015 12:45 PM EDT Reads: 2,585
"A lot of the enterprises that have been using our systems for many years are reaching out to the cloud - the public cloud, the private cloud and hybrid," stated Reuven Harrison, CTO and Co-Founder of Tufin, in this SYS-CON.tv interview at 16th Cloud Expo, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 5, 2015 12:45 PM EDT Reads: 1,225
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi’s VP Business Development and Engineering, will explore the IoT cloud-based platform technologies drivi...
Jul. 5, 2015 12:00 PM EDT Reads: 1,526
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud envir...
Jul. 5, 2015 11:45 AM EDT Reads: 2,423
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction. Th...
Jul. 5, 2015 11:30 AM EDT Reads: 1,404