Welcome!

Press Release

Kensington Addresses the Challenges of Securing Enterprise BYOD

Leading Analyst Paper Validates the Need for Security Locks as First-Line-of-Defense in Overall Security Strategy

Kensington, a worldwide leader in delivering smart. safe. simple.™ computing accessories, today announced it has sold more than 132 million feet of computer locks, enough to stretch around the world. In September, the company revealed it had sold 20 million units of its comprehensive family of security products for mobile devices and PCs, a figure representing a 70 percent market share. As the trend of Bring Your Own Device (BYOD) continues to build momentum, Kensington is well-positioned to capitalize on the growing concern around computing and security issues.

Research shows that the BYOD phenomenon continues to grow. In a recent IDC survey of U.S-based IT buyers, fully one-third said their company had already instituted a formal BYOD policy, and another 19 percent said they expected to institute a formal policy in the near term. The survey also revealed that informal support is notably higher and that while BYOD comes with many positive features, it poses daunting security challenges for even the best IT organizations.

In a recently published Analyst Connection, "The Role of Physical Security in a BYOD World," (January 2015) IDC addresses the proliferation of BYOD and the role that physical security plays in an overall security strategy. IT departments are expected to secure a variety of notebooks and desktops, as well as phones and tablets running a wide range of operating systems. Left to their own devices, many people fail to follow even the most simple and straightforward security measures. As mobile devices proliferate, IDC expects physical security, such as device locking mechanisms, to become equally important in this domain. The paper, available on Kensington's web site at kensington.com/IDCBYOD, outlines available solutions and best practices for implementing physical security.

"With more than two decades of experience providing security products, Kensington has a keen understanding of the first-line-of-defense requirements for protecting laptops, tablets and smartphones," said Louie Yao, Global Product Marketing Manager, Kensington. "The demand for physical security and BYOD security peace-of-mind will only continue to grow for devices and the data they store. BYOD is becoming increasingly prevalent, as are the heightened number of data breaches among industry-leading brands. We continue to lead innovation in this market, most recently with the introduction of the new MiniSaverTM Mobile Lock, the thinnest security lock for Ultrabooks and tablets, and the new patented CleatTM Locking Design. Kensington will continue to build on what has become known as the industry standard for physical security."

Kensington is the market leader in locking-slot specifications, locking technology and physical device locks. With more than 20 million security locks sold and integrated into over 1 billion notebooks, projectors and tablets since 1990, Kensington is the de facto standard in security slot technology. For more than 20 years, Kensington has delivered security products to businesses, large and small, including leading retailers, telecommunications companies, health providers and global financial institutions - as well as the technology manufacturers that supply them.

Over its history, Kensington has delivered security products that are compatible with nearly every major device manufacturer - including Dell®, HP®, Lenovo®, Toshiba®, and Samsung®. In fact, 95 percent of all business laptops, incorporate the Kensington Security Slot.

Tweet this: @Kensington Set to Capitalize on #BYOD and the Role of Physical Security Device Security - download the IDC Analyst Connection kensington.com/IDCBYOD

Follow Kensington on:

More Stories By Derek Kol

Derek Kol is a technology specialist focused on SMB and enterprise IT innovations.

Latest Stories
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
"Loom is applying artificial intelligence and machine learning into the entire log analysis process, from start to finish and at the end you will get a human touch,” explained Sabo Taylor Diab, Vice President, Marketing at Loom Systems, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
After more than five years of DevOps, definitions are evolving, boundaries are expanding, ‘unicorns’ are no longer rare, enterprises are on board, and pundits are moving on. Can we now look at an evolution of DevOps? Should we? Is the foundation of DevOps ‘done’, or is there still too much left to do? What is mature, and what is still missing? What does the next 5 years of DevOps look like? In this Power Panel at DevOps Summit, moderated by DevOps Summit Conference Chair Andi Mann, panelists loo...
"Tintri focuses on the Ops side of the DevOps, which basically is pushing more and more of the accessibility of the infrastructure to the developers and trying to get behind the scenes," explained Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
@DevOpsSummit at Cloud Expo taking place Oct 31 - Nov 2, 2017, at the Santa Clara Convention Center, Santa Clara, CA, is co-located with the 21st International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is ...
You know you need the cloud, but you’re hesitant to simply dump everything at Amazon since you know that not all workloads are suitable for cloud. You know that you want the kind of ease of use and scalability that you get with public cloud, but your applications are architected in a way that makes the public cloud a non-starter. You’re looking at private cloud solutions based on hyperconverged infrastructure, but you’re concerned with the limits inherent in those technologies.
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists discussed...
A look across the tech landscape at the disruptive technologies that are increasing in prominence and speculate as to which will be most impactful for communications – namely, AI and Cloud Computing. In his session at 20th Cloud Expo, Curtis Peterson, VP of Operations at RingCentral, highlighted the current challenges of these transformative technologies and shared strategies for preparing your organization for these changes. This “view from the top” outlined the latest trends and developments i...
The current age of digital transformation means that IT organizations must adapt their toolset to cover all digital experiences, beyond just the end users’. Today’s businesses can no longer focus solely on the digital interactions they manage with employees or customers; they must now contend with non-traditional factors. Whether it's the power of brand to make or break a company, the need to monitor across all locations 24/7, or the ability to proactively resolve issues, companies must adapt to...
"We focus on composable infrastructure. Composable infrastructure has been named by companies like Gartner as the evolution of the IT infrastructure where everything is now driven by software," explained Bruno Andrade, CEO and Founder of HTBase, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
Hardware virtualization and cloud computing allowed us to increase resource utilization and increase our flexibility to respond to business demand. Docker Containers are the next quantum leap - Are they?! Databases always represented an additional set of challenges unique to running workloads requiring a maximum of I/O, network, CPU resources combined with data locality.
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
Cloud promises the agility required by today’s digital businesses. As organizations adopt cloud based infrastructures and services, their IT resources become increasingly dynamic and hybrid in nature. Managing these require modern IT operations and tools. In his session at 20th Cloud Expo, Raj Sundaram, Senior Principal Product Manager at CA Technologies, will discuss how to modernize your IT operations in order to proactively manage your hybrid cloud and IT environments. He will be sharing bes...
Artificial intelligence, machine learning, neural networks. We’re in the midst of a wave of excitement around AI such as hasn’t been seen for a few decades. But those previous periods of inflated expectations led to troughs of disappointment. Will this time be different? Most likely. Applications of AI such as predictive analytics are already decreasing costs and improving reliability of industrial machinery. Furthermore, the funding and research going into AI now comes from a wide range of com...
In this presentation, Striim CTO and founder Steve Wilkes will discuss practical strategies for counteracting fraud and cyberattacks by leveraging real-time streaming analytics. In his session at @ThingsExpo, Steve Wilkes, Founder and Chief Technology Officer at Striim, will provide a detailed look into leveraging streaming data management to correlate events in real time, and identify potential breaches across IoT and non-IoT systems throughout the enterprise. Strategies for processing massive ...