Posts By Author: Sowmya Murthy

Is Your Policy Right For Your Business?
Mobility

Without an effective Mobile Device Management policy organizations will find themselves falling back on previous tactics of managing to standardization instead of managing end-user experience.

Posted by: on June 27th, 2012


Can We Agree to Disagree, Part III
Security

In the final installment in our three part point-counterpoint series,Unisys experts give you answers to the question: "When it comes to mobile devices, should IT departments secure the device, the user, the application, or the data?"

Posted by: , and on June 8th, 2012


360-Degree Visibility: Anything Less is a Costly Mistake
Disruptive IT Trends

The need of the hour is to raise protection levels against cyber-crime with visibility across all aspects of security operations.

Posted by: on June 8th, 2012


Can We Agree to Disagree, Part II
Security

Unisys executives share contrasting views on the question: Should security be offensive or defensive?

Posted by: , and on April 12th, 2012


Can We Agree to Disagree?
Security

When it comes to IT strategies, there are few absolutes​. Our experts debate and discuss the question "How much security is enough?"

Posted by: , and on March 27th, 2012


Year in the Rear View Mirror: Part III
Security

2011 was a year of unprecedented cybercrime. The pressure will not let up in 2012. Is your enterprise ready for the road ahead?

Posted by: on December 13th, 2011


Year in the Rear View Mirror: Part II
Security

What is Richard Bryant so worked up about? - Hacking threats, and the desire to demystify cyber crime.

Posted by: on December 13th, 2011


Year in the Rear View Mirror: Part I
Disruptive IT Trends

While most blogosphere focused on the “what” of 2011 security challenges, we added more to the “how” enterprises are going to address these security challenges.

Posted by: on November 29th, 2011


Year in the Rear View Mirror: Part I
Security

While most blogosphere focused on the “what” of 2011 security challenges, we added more to the “how” enterprises are going to address these security challenges.

Posted by: on November 29th, 2011


CISO Uncovers a Few Surprises and Shares Unisys Best Practices with European Clients
Security

Patti Titus addresses learnings from Belgium and Holland clients about Consumerization of IT.

Posted by: on October 25th, 2011


<< Back


Back To Top
Copyright © Unisys 2017

We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.