What’s in a Jelly Bean: is Android 4.1 going to help with BYOD?

Google recently announced Android 4.1 ‘Jelly Bean’ at its I/O conference in San Francisco. The latest flavor of the world’s #1 mobile OS promises better user experience and sexier UI. But does it really make any easier for IT to secure and manage those personal devices used for work?

Generally speaking, 4.1 is an incremental release that takes Android one step closer to Apple iOS, which has been in the market for 5 years now. From a corporate IT perspective, nothing is dramatically different or better.

Read more of this post

Managing consumer technology in the enterprise

“Corporate IT needs to change mindset to better support the business “

Talking regularly* about the consumerization of IT can often make one sound like a broken record, but the economic, security and management challenges it throws up for enterprises are too important to ignore.

The problems boil down to a lack of control, which can be described in two key ways. IT departments of course are built on policies, planning and predictability, but the introduction of technology from the consumer sphere, even when purchased centrally by IT teams for use in the enterprise, creates its own problems. Read more of this post

Mobile Security: iOS Jailbreaks Pose Risks

*** UPDATE 9/1/2015: KeyRaider Compromises 225K (jailbroken) Apple Logins ***

http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/

 

Mobile Security: iOS Jailbreaks Pose RisksJailbreaking is happening in the millions: don’t turn a blind eye.



The latest jailbreak for iOS 6.1, released on 4 February, was downloaded by a whopping 5 million users in the first 48 hours alone, according to the website stats posted by Cyril (a.k.a. pod2g), the developer of the latest hack published on evasi0n.com. During these first two days, the websites served 40 million page views of which a good 50 per cent to 2.5 million unique visitors from the U.S.

Read more of this post

Mobility Management and Security. A Customer Panel. Part Two.

Learn from a panel of industry peers the solutions and the best practices that have turned consumer mobile technology into a competitive advantage for their companies.

This is Part Two of the post based on the panel that I moderated at the IDC mobileNext Forum 2011 in San Francisco. Click here for Part One.

Eric Erickson
VP Information Systems
Liberty First Credit Union

Bill Troyak
Team Leader End User Devices
Navistar

Jeff Jackson
Partner
Acumen Technologies

Going back to the three step approach to consumerization, the last step is to deploy new security and management tools to enable these new models. It’s not just about new platforms. Traditional System Management tools don’t really cut anymore. Id love to know more about your experience and your learning with regard to the necessary new infrastructure.

Eric:  Well, being a financial institution, it’s critical for us to make sure our data is secure.

Read more of this post

Mobility Management and Security. A Customer Panel.

Learn from a panel of industry peers the solutions and the best practices that have turned consumer mobile technology into a competitive advantage for their companies.

This post is based on the recording of the panel that I moderated at the IDC mobileNext Forum in December 2011 in San Francisco.

Eric Erickson
VP Information Systems
Liberty First Credit Union

Bill Troyak
Team Leader End User Devices
Navistar

Jeff Jackson
Partner
Acumen Technologies

I’d like to start by asking the panelists to briefly introduce themselves and the size and scope of their BYOD programs.

Eric: My name is Eric Erickson. I have been at Liberty First Credit Union for seven years as the VP of Information Systems and in the technology field for almost 25 years, 17 of those years with financial institutions. Our mission is to provide security for our members and provide our staff with the tools that they need to be able to work with the members to be able to get their accounts opened in a timely fashion or to get the documents that they need. We are looking to the mobile device to be able to move beyond our physical location so that we can go out to the community and work with the members where it’s convenient for them.

Read more of this post

MDM not the only avenue to BYOD security. But technology is simply not there yet.

My reply to Steven Song’s post on Cisco Security Blog

http://blogs.cisco.com/security/mdm-not-the-only-avenue-to-byod-security/

Yes. Mobile virtualization is the way to go. In an increasingly Consumerized IT world however, meeting end-user expectations in terms of convenience, cost and usability is even more important than addressing corporate IT professionals’ concerns about security and manageability. Despite a few remarkable attempts by VMware, Citrix and WISE, technology is simply not there yet.

Read more of this post

Consumerization and Mobile Security

How to bypass the iPad password in 5 second

*** UPDATED AS OF 11/14/2011: I can confirm that Apple has fixed this security flaw in iOS 5.0.1 (9A405) ***

http://www.youtube.com/watch?v=ZPHDm88-HAc

Watch how to crack the iPad password in 5 secondsThe consumerization of IT is the single most influential technology trend of this decade. Companies are already well aware of it, as they wrestle with the growing influence of smartphones, tablets, Facebook, Twitter, Dropbox and on and on. While this growth does bring business value, too many companies make the mistake to trust consumer technology with corporate sensitive data without deploying appropriate enterprise-grade infrastructure to secure and manage it. Consumer technology is sexy, convenient and easy to use. When it comes to security and data protection however, consumer technology still has a long way to go. Security and data protection in fact remain top concerns among IT professionals – see The Consumerization Report 2011.

Read more of this post

‘Trend Micro Consumerization Report 2011’ revealed at the Gartner Summit in London

MEDIA ALERT: Cesare Garlati, Senior Director of Consumerization at Trend Micro, to reveal findings of the ‘Trend Micro Consumerization Report 2011’ at the Gartner Security & Risk Management Summit in London


“Rather than resist it, organisations should embrace Consumerization to unlock its business potential. This requires a strategic approach, flexible policies and appropriate security and management tools.”

Speaking at the Gartner Security & Risk Management Summit in London on 19 September 2011, Cesare Garlati, Senior Director of Consumerization at Trend Micro, will be speaking about what Gartner consider the single most influential technology trend of this decade: the Consumerization of IT. Or, how private technology use by employees is becoming increasingly embedded in their business activities and working practices.

Read more of this post

Embrace Consumerization in the Enterprise

Fireside Chat with Ty Smallwood, Chief Security Officer, Medical Center of Central Georgia – Gartner Security Summit 2011, Washington DC.


According to Gartner, the consumerization of IT is the most significant trend affecting the IT Industry in the next ten years. As the Security Officer of one of the largest health care organizations in the U.S., how do you feel about this trend? How is it affecting your organization?

There has definitely been an impact on the organization, both from a policy process and procedure perspective. The cost to accommodate consumerization is always a factor.

Read more of this post

Embrace Consumerization. Unlock Opportunity.

This blog post is based on my talk at the annual “IDC Asia/Pacific CIO Summit” held last July 28, 2011 in Singapore.


The world of enterprise IT is going through lot of changes right now. One of the most important trends that’s causing these changes is consumerization.

Now, what is consumerization? Simply put, it’s the trend wherein employees use their own personal IT devices for work. The most obvious consumerization devices are smartphones. More and more smartphones are being sold to consumers today. In fact, 92 million computers were sold in the last quarter of 2010 but more than 100 million smartphones were sold within the same time frame.

These devices are ending up in the hands of tech-savvy users who have never known a world without the Internet… or a world without immediate connectivity and access. Businesses are going to have to make some real adjustments to lure this new wave of talents and that’s going to require offering them more choices than traditional, standard-issue office laptops.

Read more of this post