Mobile Device Management: Is It Possible to Have a Good BYOD Strategy?
Bring your own device (BYOD) availability is a great way to get users to work with mobile devices or their own laptops on the network. It reduces the cost for the company by eliminating the need to purchase smartphones and tablets, and users can carry around their own equipment a...
August 2017, as barometers fell and the flood waters rose around Houston, Texas, administrators had plenty to think about. First and foremost was patient safety in an impending Category 4 hurricane. Then, they confronted operational challenges--how to maintain staffing needs and how to support stranded, overwhelmed, and exhausted medical teams. The availability of supplies in a just-in-time environment was compounded by the increasing needs of a population suffering injuries from the storm.
They should not have had to w...
Mobile CASB, is Controlling a Cloud Application Enough?
Having a hybrid cloud solution is common with small and large businesses. If your business has an on-premises network but utilizes cloud infrastructure for some of its services, you have a hybrid cloud network. Any data that leaves your network is vulnerable to attackers. Any data th...
Security isn't just about hardening your internal network protection. Your perimeter networks also need security reviews and updates regularly. Whether it's a DMZ, a wireless access point or just an external network connecting to your core domain, you need to ensure that your employee and customer data are safe.
Machine Learning: Is It Really the Next stage in Security?
Most people understand that computers do what they are told, but the concept of machine learning is a complex part of artificial intelligence (AI) where a computer "learns" without being specifically told what to do. Researchers have leveraged AI to turn machine learning into prec...