Google Vault Makes Play for Mobile Security Hardware Space

Google Project VaultLast week Google made a splash with its latest futuristic tech offering: Project Vault. In essence, this mini-computer on an SD card is designed to enable secure authentication, communications and data storage on your smartphone or laptop. So what exactly is going on here? After years experimenting with Android, has one of the world’s biggest software companies finally admitted hardware level security is the way forward? And if so, what are the implications for enterprise and consumers? Read more of this post

How secure is Mobile Device Management anyway?

Objective-C HookingResearchers have successfully breached the Good Technology container. MDM software can only be as secure as the underlying operating system.

As the adoption of smartphones and tablets grows exponentially, one of the biggest challenges facing corporate IT organizations is not the threat of losing the device – likely owned by the employee – but the threat of a targeted attack stealing sensitive corporate data stored on these mobile devices. As a first line of defense, an increasing number of companies rely on Mobile Device Management software and Secure Container solutions to secure and manage corporate data accessed from these mobile devices. However, a recent analysis conducted by Lacoon Mobile Security – presented a few weeks ago at the BlackHat conference in Amsterdam – shows that the leading secure container solution Good Technology can be breached and corporate email stolen from Apple iOS and Android devices.

Read more of this post

BYOD – The Benefits [VIDEO]

cesare-garlati-financial-impact-of-byod.3IT strategists and commentators alike have been talking about the cost impacts and benefits of the Consumerization of IT for years. However, no-one seems to agree on what’s actually going on out there from a financial perspective. Why? Because no one has managed to formulate an effective framework for measuring the financial impact of consumer-grade technology on the enterprise. IT managers are effectively flying blind with only a vague notion of what to measure and how to measure it.

Read more of this post

BYOD – The Hidden Costs [VIDEO]

cesare-garlati-financial-impact-of-byod.2Executives and IT leaders are struggling to understand the true costs and benefits of IT consumerization and it’s not difficult to see why. Even a cursory Google search on the subject throws up as many questions as it does conflicting answers. The reason is that no comprehensive research has been conducted into the financial impact of such programs before.

That’s why Trend Micro recently decided to take the bull by the horns and commission Forrester Consulting to conduct a rigorous, scientific study – interviewing over 200 IT leaders in the US, UK, France, and Germany. With the results we have begun to build an accurate picture for the first time of what organizations are measuring in their BYOD programs and the cost impacts, in order that IT leaders can go away and begin to formulate for themselves an effective cost benefit analysis.

Read more of this post

BYOD: You can’t manage what you don’t measure [VIDEO]

cesare-garlati-financial-impact-of-byod.1The Consumerization of IT is a trend even the most parochial IT manager has surely heard of by now. It’s sweeping through enterprises across the planet with no regard for legacy, tradition or order and can be seen as either the most exciting or terrifying thing to happen to IT in the past decade, depending on where you stand.

For many IT managers, unfortunately, the prevailing attitude is still “why should I allow it?”. They are clinging on to the old paradigm whereby IT controlled and dictated the purchasing and ongoing management of technology used by employees. This attitude just will not stand any longer – consumerization is happening, and it needs to be managed in as financially efficient a manner as possible.

Read more of this post

Webinar: The Financial Impact of BYOD.

webinar-promo-cesare-garlati-byod.1280x720.1An increasing number of organizations allow employees to use personal mobile devices to connect to corporate networks and data for work – the so-called ‘Bring Your Own Device’ phenomenon. However, a recent study by Forrester Consulting reveals that only a few companies measure and understand the actual financial impact of this new IT model and that even fewer know the true costs and benefits of Consumerization of IT.

Join us on June 27th at 11:00 PDT/2:00 EDT for a live webinar with Cesare Garlati, a sought-after expert in enterprise mobility, who will review the findings of the study and discuss:

  • Key factors that compel firms to deploy BYOD programs
  • How IT organizations measure ROI of Consumerization
  • The hidden costs of BYOD and its benefits

Cesare will explain how to develop the financial framework for your BYOD initiative so that you can unlock the full business potential of the Consumerization of IT model.

You will know the bottom line at the end of this discussion!

Video: The Dark Side of BYOD

The Dark Side of BYODThe Dark Side of BYOD: Privacy, Personal Data Loss and Device Seizure. Many employees don’t understand the implications of using their personal devices for work. Many companies don’t understand that they are in fact liable for the consequences.


Thought leadership video taken at the SIIA event All About The Cloud 2013 in San Francisco.

Credits: Montclare – May 2013
Original video…

This post covers the things you always wanted to know about BYOD but were too afraid to ask.

Icebergs, The Nordics, and Other BYOD Considerations

The BYOD iceberg headed towards your businessNew data shows that companies are increasingly exposed to security risks due to a variety of consumer-grade technology brought in by the employees.

I just returned from a tour in the Nordic countries where I presented to the local press the results of the latest BYOD survey* conducted by YouGov on behalf of Trend Micro. The data collected from 3,012 interviews across Norway, Sweden, and Denmark highlights many details of this controversial IT Trend. Most importantly, the research confirms an undeniable truth: Companies around the world are exposed to increasing security risks due to a variety of consumer-grade technology brought into the enterprise by the employees and inevitably used for work-related activities.

Read more of this post

BYOD, Enterprise Mobility and Beyond – What to expect in 2013

BYOD, Enterprise Mobility and Beyond – What to expect in 2013Trend Micro’s CTO Raimund Genes recently published his traditional new year predictions for 2013. Quite insightful and mind opening paper, which I invite you to download and add to your reading list for the Holidays.

Interestingly enough for Trend Micro – the company that has made the “Journey to the Cloud” its corporate mantra – Raimund’s top two predictions are not related to the cloud but rather to the inevitable impact of consumer mobile platforms on corporate IT – a topic particularly relevant to the Consumerization blog and to the Enterprise Mobility professionals among us:

#1 The volume of malicious and high-risk Android apps will hit 1 million in 2013.

#2 Windows 8 offers improved security—but only to consumers.

Read more of this post

Legal and technical BYOD pitfalls highlighted at RSA Conference

Companies that don’t protect themselves through policies place themselves at risk.

Post based on my interview* with Mikael Ricknas of Computerworld.

Allowing employees to bring their own devices to work is causing new challenges, including what happens when a device needs to be wiped or employees want to sell their smartphone or tablet.

Mobile security and BYOD (bring your own device) are main themes at the European edition of RSA’s security conference, which takes place this week in London.

Letting employees use their own smartphones or tablets for work represents a loss of control for IT departments. Also, if personal data isn’t handled correctly, the company may end up being sued, said Cesare Garlati, vice president of mobile security at Trend Micro and the moderator of a conference session called “The Dark Side of BYOD“.

Read more of this post


Get every new post delivered to your Inbox.

Join 28 other followers