The BYOD Mobile Security Spectrum: A Taxonomy
Winn Schwartau, noted and published Cyber Security Expert discusses and outlines the BYOD conundrum, that just about every private, government and military organization is asking itself today about the consumerization of IT by mobile devices of myriad flavors. The BYOD conundrum however, may be a mis-phrasing as it may not be an “either or” binary question. This paper will functionally’ taxonimize’ the security spectrum of BYOD and options available to enterprises today.
To read this Taxonomy, click here The BYOD Mobile Security Spectrum
Mobile Enterprise Compliance for Healthcare: A Case Study
iPhones, iPads and other smartphone and tablet devices are being unleashed in the Healthcare Sector in staggering numbers.
The problem: How does IT adhere to HIPAA compliance guidelines and control and manage their mobile enterprise? The prevailing legislation proscribes civil, criminal and regulatory violations if privacy is not protected and these devices are not truly secure.
Visiting Nurse Service of New York (VNSNY), the largest not-for-profit organization of its kind in the world with over 12,000 users has faced this issue and the attached interview is a case study in the kind of thinking and analysis required.
Georgia Tech Releases it’s Emerging Cyber Threats Report
with contribution from Mobile Active Defense
To read the entire report click below:
Georgia Tech Emerging Cyber Threats Report 2011
2011 North America New Product Innovation of the Year Award from Frost & Sullivan
Global Analyst Group Frost & Sullivan awards Mobile Active Defense the prestigious 2011 New Product Innovation of the Year Award in the field of Mobile Enterprise Protection for the development of the Mobile Enterprise Compliance and Security Server (MECS).
To access the complete Award Report click here: M.A.D. Frost & Sullivan Award Report
Frost & Sullivan features Mobile Active Defense in a Network Security Technology Alert
“Explosive global growth and adoption of smart phones has in turn propelled the need for providing improved functionality and performance. The act of balancing information and security in mobile phones with the right technology has now become essential. M.A.D. has delivered a complete solution that handles security, management and compliance issues in mobile devices and offers a comprehensive solution that takes care of security, management, remediation and compliance.”
To download the entire Alert click here: M.A.D. NST Alert