What’s in a Jelly Bean: is Android 4.1 going to help with BYOD?

Google recently announced Android 4.1 ‘Jelly Bean’ at its I/O conference in San Francisco. The latest flavor of the world’s #1 mobile OS promises better user experience and sexier UI. But does it really make any easier for IT to secure and manage those personal devices used for work?

Generally speaking, 4.1 is an incremental release that takes Android one step closer to Apple iOS, which has been in the market for 5 years now. From a corporate IT perspective, nothing is dramatically different or better.

Read more of this post

Managing consumer technology in the enterprise

“Corporate IT needs to change mindset to better support the business “

Talking regularly* about the consumerization of IT can often make one sound like a broken record, but the economic, security and management challenges it throws up for enterprises are too important to ignore.

The problems boil down to a lack of control, which can be described in two key ways. IT departments of course are built on policies, planning and predictability, but the introduction of technology from the consumer sphere, even when purchased centrally by IT teams for use in the enterprise, creates its own problems. Read more of this post

The Battle of the Titans: What it all means for IT managers caught in the middle

“Adapt, accept and manage: a BYOD mantra for corporate IT”

ANY CHARACTER HERE

RIM and Apple: two firms with more contrasting current fortunes you could not wish to imagine. The once high-flying Canadian BlackBerry-maker, for so long the darling of IT managers and beloved of time-starved execs the world over, has lost its way as rivals from the consumer space start to eat into its core enterprise business. Then there’s the phenomenon that is Apple, the Cupertino giant molded into the slick, stylish consumer success story it is today by the late Steve Jobs. You’re probably as likely in many organizations to see staff using an iPhone for work as a BlackBerry today, which makes two recent announcements from the tech giants all the more interesting for what they say about the firms’ respective strategies and what it all means for IT managers caught in the middle. Read more of this post

BYOD Best Practices – Three pitfalls you can’t afford to ignore

In a previous post1I raised three pitfalls that your BYOD program cannot afford to ignore when allowing employees to use their personal devices for work:

– Remote deletion of personal data on an employee-owned device
– Tracking an individual’s location
– Monitoring an employee’s Internet access

Based on my involvement with various BYOD projects2 and my ongoing conversations with many industry experts, here is my recommendation for three best practices that will allow you to strike the delicate balance between employee privacy and corporate liability :

Read more of this post

How Secure is Your Smartphone? Android, iOS, BlackBerry and Windows Phone Under Attack

Post based on my interview* with David Gilbert of IBTimes UK

As the adoption of smartphones grows rapidly, one of the biggest challenges facing the manufacturers, developers and, ultimately, users is not the threat of losing your phone, but the threat of someone stealing the personal data stored on your mobile phone.

Senior Director of Consumerization at Trend Micro, Cesare Garlati spoke to the IBTimes UK about this serious issue and made it clear that no matter what type of phone you own, you are in danger. “Every single platform is exposed to this, no platform is immune. Some are safer than others, but none are immune.”

Read more of this post

Jailbreaking BYOD Control. Is Apple ready for enterprise primetime?

Mobile World Congress 2012

Mobile World Congress 2012

Consumerization is happening now, but many IT departments simply aren’t prepared to deal with the new challenges and complexities it entails. With IT managers increasingly urged by CEOs to stop saying ‘no’ and start supporting consumer tools, they need to reappraise their traditional approach. Put simply, IT needs flexible standards – they can’t say no but neither can they say yes to everyone.

Read more of this post

Mobile Security: iOS Jailbreaks Pose Risks

*** UPDATE 9/1/2015: KeyRaider Compromises 225K (jailbroken) Apple Logins ***

http://researchcenter.paloaltonetworks.com/2015/08/keyraider-ios-malware-steals-over-225000-apple-accounts-to-create-free-app-utopia/

 

Mobile Security: iOS Jailbreaks Pose RisksJailbreaking is happening in the millions: don’t turn a blind eye.



The latest jailbreak for iOS 6.1, released on 4 February, was downloaded by a whopping 5 million users in the first 48 hours alone, according to the website stats posted by Cyril (a.k.a. pod2g), the developer of the latest hack published on evasi0n.com. During these first two days, the websites served 40 million page views of which a good 50 per cent to 2.5 million unique visitors from the U.S.

Read more of this post

‘Trend Micro Consumerization Report 2011’ revealed at the Gartner Summit in London

MEDIA ALERT: Cesare Garlati, Senior Director of Consumerization at Trend Micro, to reveal findings of the ‘Trend Micro Consumerization Report 2011’ at the Gartner Security & Risk Management Summit in London


“Rather than resist it, organisations should embrace Consumerization to unlock its business potential. This requires a strategic approach, flexible policies and appropriate security and management tools.”

Speaking at the Gartner Security & Risk Management Summit in London on 19 September 2011, Cesare Garlati, Senior Director of Consumerization at Trend Micro, will be speaking about what Gartner consider the single most influential technology trend of this decade: the Consumerization of IT. Or, how private technology use by employees is becoming increasingly embedded in their business activities and working practices.

Read more of this post

Embrace Consumerization in the Enterprise

Fireside Chat with Ty Smallwood, Chief Security Officer, Medical Center of Central Georgia – Gartner Security Summit 2011, Washington DC.


According to Gartner, the consumerization of IT is the most significant trend affecting the IT Industry in the next ten years. As the Security Officer of one of the largest health care organizations in the U.S., how do you feel about this trend? How is it affecting your organization?

There has definitely been an impact on the organization, both from a policy process and procedure perspective. The cost to accommodate consumerization is always a factor.

Read more of this post

Embrace Consumerization. Unlock Opportunity.

This blog post is based on my talk at the annual “IDC Asia/Pacific CIO Summit” held last July 28, 2011 in Singapore.


The world of enterprise IT is going through lot of changes right now. One of the most important trends that’s causing these changes is consumerization.

Now, what is consumerization? Simply put, it’s the trend wherein employees use their own personal IT devices for work. The most obvious consumerization devices are smartphones. More and more smartphones are being sold to consumers today. In fact, 92 million computers were sold in the last quarter of 2010 but more than 100 million smartphones were sold within the same time frame.

These devices are ending up in the hands of tech-savvy users who have never known a world without the Internet… or a world without immediate connectivity and access. Businesses are going to have to make some real adjustments to lure this new wave of talents and that’s going to require offering them more choices than traditional, standard-issue office laptops.

Read more of this post