Up

November 2012

IMATION :: Secure workspace blueprint whitepaper
File Size:
260.63 kB
Date:
13 December 2012
Downloads:
0 x
The concept of “remote work”, or teleworking, has become an increasingly important concept for organizations attempting to become more flexible and agile, while driving down costs. IDC reports that there are 1.3 billion mobile workers today; that number is expected to grow to 1.6 billion by 2015.
IMATION :: Secure workspace blueprint whitepaper
Rating: 0 / 0 vote  
Only registered and logged in users can rate this file
IMS :: Better way to enable telework
File Size:
567.68 kB
Date:
13 December 2012
Downloads:
0 x

Remote work is becoming increasingly important for organizations that are attempting to drive
down their costs and to become more agile by enabling employees to work from any location –
at home, at customers’ sites, in remote offices, etc. Moreover, the US and other governments
have become significant proponents of the telework concept as a means of reducing their costs
and to support various “green” initiatives.

IMS :: Better way to enable telework
Rating: 0 / 0 vote  
Only registered and logged in users can rate this file
EXPERIAN :: Interim Fraud report
File Size:
2.99 MB
Date:
13 December 2012
Downloads:
0 x

During the course of the last year and notably within the past six months,
fraudsters are clearly becoming faster, more flexible and adaptable as they switch
from product to product in order to try to cash in on opportunities.
This is in part a reflection on the challenging economy and continued squeeze on
household incomes.

EXPERIAN :: Interim Fraud report
Rating: 0 / 0 vote  
Only registered and logged in users can rate this file
NEMERTES :: Pervasive security issue paper
File Size:
824.59 kB
Date:
13 December 2012
Downloads:
0 x

As more employees bring mobile devices with new types of apps into the workplace, IT must provide pervasive, policy-­‐based access to these apps without compromising security policy, degrading performance, or significantly increasing cost. Most organizations use Mobile Device Management (MDM) and/or Mobile Application Management (MAM) solutions to address security requirements. But moving forward, IT leaders must rethink mobile security. Because organizations use both on-­‐prem and cloud-­‐based apps, they likely will end up with both cloud-­‐based and on-­‐premise security solutions. But unless these are tied together with unified policy and management, and address numerous types of mobile devices along with various threats, this is not a viable security strategy, particularly in a Bring-­‐Your-­‐Own-­‐Device environment. A hybrid fixed and mobile workplace providing a mix of on-­‐premise and cloud applications needs an array of security solutions directed by a flexible security policy that follows the user, regardless of device or location. And though the vast majority of companies (84.4%) see the benefit of a pervasive security solution, few (29.4%) say they’re deploying such a solution today.

NEMERTES :: Pervasive security issue paper
Rating: 0 / 0 vote  
Only registered and logged in users can rate this file
 
Powered by Phoca Download