Posts tagged for “Mobile devices”

Consumerization of IT: Moving Beyond Security Concerns for IT Organizations, Part III
Security

Part 3 of this discussion focuses on understanding security requirements and innovating on what's possible.

Posted by: on October 20th, 2011


Consumerization of IT: Moving Beyond Security Concerns for IT Organizations, Part I
Security

A holistic approach is necessary to design a mobile device security strategy that meets the needs of the enterprise while providing the security for enterprise data.

Posted by: on October 18th, 2011


Beyond the Hype of Consumerization of IT, Part III: We Are Ready To Deploy!
Security

Review IT Architecture. Check. Determine Who’s Getting Access To What Device. Check. Reviewed Governance And Lay Out Strategy. Check.

Posted by: on October 6th, 2011


Taming the Mobile Application Portfolio in your Enterprise
Mobility

As mobile devices make their way into the enterprise, discussions have shifted from whether to allow mobile devices to how to best take advantage of them.

Posted by: on October 6th, 2011


Beyond the Hype of Consumerization of IT, Part I: The Data
Security

"There’s an app for that." How did we cope before we had that for an answer to so many of life’s questions downloadable into a cool gadget that fits in the palm of our hand?

Posted by: on October 4th, 2011


The Seismic Security Shift of 2011
Security

Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.Society’s dependencies are migrating from the real (analog) world to the network-connected digital world.

Posted by: on March 1st, 2011


Spotted: Secret meeting of the secret club
Security

Unisys Backup as a Service can provide the scalability, the flexibility and reliability to handle the epic increase in the amount of data and variety of devices that now full under the purview of corporate control, and do so with a degree of flexibility, scalability and reduced cost that suits the needs of the modern enterprise.

Posted by: on February 4th, 2011


IT Security 2011: Risk Interlinked
Security

Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.Four connected challenges facing IT departments this year.

Posted by: on January 27th, 2011


Can bank collaboration safeguard m-payments and profit from The Netherland’s insatiable thirst for convenience?
Security

Posted by: on December 2nd, 2010


The Communication Gap
Security

Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.Normally I blog about security issues, but today I have a completely non-security related topic: How technology is creating a communication gap between us all.

Posted by: on October 26th, 2010


Back To Top
Copyright © Unisys 2017

We use cookies on this site. By using this site, you agree to our use of cookies. To change or learn more, see our Privacy Notice.