Inside the Briefcase


Federating Identities for a Successful Enterprise IdP Deployment

Federating Identities for a Successful Enterprise IdP Deployment

by Lisa Grady, Radiant Logic
When customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security...

BYOD Security: 5 Tips for IT Professionals

BYOD Security: 5 Tips for IT Professionals

by Rick DelGado, Independent Author
Personal devices have become a common part of the working environment now. More and more, companies are adopting Bring Your Own Device (BYOD) policies, allowing employees to use their own devices both inside and outside...





Briefcase Highlights


MOBILE DATA

Delivering Next-Gen Customer Experiences: How to Quickly Build the Apps Your Business Needs

October 31, 2014 No Comments

As customer-focused executives, you understand all too well that success today is based on delivering great customer experiences. Increasingly, this means that you need next generation applications to support new processes, products/services and even business models. These applications aid a variety of functions, including serving customers across channels, assisting with sales and marketing operations, supporting customer communities, and enabling e-commerce and other digital services.

BYOD to BYOA: Shaping the Future of Your Work Environment

October 31, 2014 No Comments

The Bring Your Own Device (BYOD) trend has been growing in a number of businesses for the past few years. Now, a different, yet related, trend has emerged—Bring Your Own Application (BYOA). BYOA allows employees to choose and use the software they believe helps them perform their jobs best and bring these programs into the office on their devices.

BYOD: California Court Decides Who’s Wearing the Pants

October 22, 2014 No Comments

The workplace trend of BYOD (Bring Your Own Device) is nothing new. What remains unclear, however, is the burden of ownership, cost and security. When employees bring their own cell phones, laptops or tablets to work, there’s a fair chance they’ve personally purchased those devices—data plans and all. In fact, some employers today require a BYOD policy, with no intention of paying for any of it. As one CIO bluntly put it, “Well, we don’t buy their pants either, but they’re required for the office.”

New Mendix Release Enables No-Code Delivery of Multi-Device Mobile Apps for the Enterprise

October 22, 2014 No Comments

Mendix, the enterprise app platform as a service (aPaaS) company, announced major enhancements to the Mendix App Platform, drastically reducing the time, cost and effort for companies to deliver multi-channel and mobile apps. With this new release, Mendix empowers both business users and developers to easily build cross-platform mobile apps that provide the rich, native experience enterprise users are clamoring for.

Federating Identities for a Successful Enterprise IdP Deployment

October 15, 2014 No Comments

by Lisa Grady, Radiant LogicWhen customers, employees, or partners log in—from any device—they expect a seamless experience and secure access to your resources. Organizations are trying to meet a number of benchmarks, not just in terms of security but also productivity and simplicity for your users. Read More >>>

Sophos Advances Cloud Mobile, and Web Security with Acquisition of Mojave Networks

October 7, 2014 No Comments

Sophos today announced that it has acquired cloud-based security firm Mojave Networks of San Mateo, Calif. This acquisition will strengthen Sophos cloud-managed and appliance-based security solutions. To Sophos Cloud, an integrated cloud-managed security offering, Mojave will add a rich cloud-based web security solution. And to Sophos’ line of network security hardware it will enable hybrid deployment options (SaaS and non-SaaS) to meet diverse web security needs.

Innovation in the enterprise: How can CIOs ensure its success?

September 29, 2014 No Comments

How CIOs can handle the disruption caused by increased innovation in the enterprise. Ten years ago, mobile consisted of email, voice and SMS. Any innovation was very much behind the firewall, in a closed environment. If new developments were needed, resources would have to be allocated and as a result, any CIO would have to be very sure of a return on the investment before innovation projects could go ahead.

Why VMI is the future for our BYOD Generation

September 24, 2014 No Comments

While many approaches are being used to control the impact of the mobile age on IT, VMI technology shows your organization can both embrace and thrive in this new world.

Driving Enterprise Transformation with Box and Office 365

September 23, 2014 No Comments

Download this white paper and read how IT needs a transformation to a more user-centric, mobile-aware and agile model, and the best-of-breed architecture the cloud affords is key to unlocking this next evolution of enterprise technology.

The Four Phases of Cloud Optimization

September 12, 2014 No Comments

with Joe Kinsella, CloudHealthSeveral years ago, I joined a company in the middle of a frantic architectural transition that prioritized speed over cost. During my first few months, I watched our Amazon Web Services bill creep from $100K per month to over $350K. Read More >>>

How far is too far when it comes to outsourcing IT?

September 8, 2014 No Comments

with Mike Decker, Annese & Associates, Inc.With more than 25 years of IT experience, perhaps I can shed some light on strategies for IT outsourcing, but first let me frame my point of view. With a BS in Telecommunications, I started my career inside a NOC located in the basement of a major bank in Buffalo, NY. Read More >>>

8 Things You Need to Do Before, During, and After Migrating to Office 365

September 4, 2014 No Comments

with Robert Berlin, OneLoginWith Windows Server 2003 hitting its end of life next year, the push is on for even faster migration. But the path is a complex one, and careful planning will be your best friend. Having spent a number of years helping customers along this road, here are my top tips for a safe journey. Read More >>>

You Can’t Win the Data Loss Blame Game – So End It

September 3, 2014 No Comments

By Omer Eiferman, CellroxIn a world of desktops, tracking data leaks was much easier. If an employee digitally leaked corporate data or insider information, IT could usually pin down when and where it happened. However, with personal smartphones now being used for business, the blame game is not so simple. Read More >>>

Raising the game – The IBM Business Tech Trends Study

August 26, 2014 No Comments

IBM has evaluated the current adoption landscape of 4 key technologies in the enterprise: Big Data & Analytics, Cloud, Mobile and Social

IT Briefcase Interview: Mobile Website and Custom APIs Monitoring

August 11, 2014 No Comments

In this interview, Zaheeruddin Ahmed B, marketing analyst at Site24x7, a ManageEngine cloud service, discusses the need for a way to monitor mobile apps and mobile-optimized websites — from the perspective of the mobile user — and his company’s efforts to do just that with its industry-first mobile monitoring solution.

Context-Aware Security: A Key to Successful BYOD

August 4, 2014 No Comments

by Neal Foster, DELL SoftwareHow can IT give users what they want and protect data assets at the same time? By implementing context-aware security. Context awareness is something most of us practice every day. Read More >>>

Got WiFi? Free App Helps You Meet Basic User Needs

July 28, 2014 No Comments

Did you hear the one about the teacher who asks a group of students to name something they need but can’t see or feel? The hip-hop loving, smart-gadgets sporting, what’s-apping generation answer in unison, “WiFi.” Increasingly, WiFi is becoming indispensable and, apparently, a candidate for inclusion in Maslow’s hierarchy of basic human needs.

Assessing the Cloud to Find its Silver Lining

July 24, 2014 No Comments

by Russ Loignon, TangoeBusiness moves at the speed of light, and the ability to stay competitive in today’s global workplace dictates that enterprises rely on the technology available today, yet be prepared to adapt quickly for future technologies. Read More >>>

Globalizing the Continuous Delivery Pipeline

July 23, 2014 No Comments

by Rob Vandenberg, LingotekThanks to trends like BYOD and cloud computing, devops now works together as a unified organization, rather than throwing code over an invisible wall. It’s a necessary and timely evolution—especially for today’s sophisticated global IT environments. Read More >>>

Mobility Today and Tomorrow: It’s Time to Dial In

July 10, 2014 No Comments

Mobile today is changing how people interact as well as how work gets done. The questions that remain are, what will drive the factors that fuel mobile’s next evolution and for those who still haven’t taken the leap, what should they consider as they decide to go mobile?

BYOD Security Risks: Companies May Be Playing with Fire

June 26, 2014 No Comments

The BOYD policy has already become a substantial factor in the corporate world, with there being enough documented evidence to establish the fact that it gives a significant boost to employee’s productivity. As more and more companies are warming up to the idea of allowing personal mobile devices in the workplace, the security implications of adopting such a policy are becoming increasingly hard to ignore. Indeed, companies are putting a lot at risk for getting a bit more out of their employees.

Simplifying the Development and Publishing of Apps for Businesses Today

June 24, 2014 No Comments

As digitization and mobility in companies become all pervasive, and IT departments continue to strive to do more with less, the shortage of IT skills to support Mobile Apps development and publishing is an increasingly acute issue.

Mobile Content, Collaboration & IDC’s 3rd IT Platform: The Next Frontier for the Mobile Enterprise

June 9, 2014 No Comments

This IDC White Paper outlines the next frontier for the mobile enterprise: mobile content and collaboration in the context of IDC’s 3rd IT Platform.

Empowering Your Mobile Workers – A Modern Mobile IT Strategy

June 9, 2014 No Comments

Here’s how some of the nation’s most progressive corporations are meeting the many needs of their mobile workers – without overwhelming their IT departments.

With BYOD, You Don’t Have to Choose Between Productivity and Security

June 6, 2014 No Comments

Mobile devices could become an immense source of productivity, but employers are still reluctant to let employees use apps of their choice on personal devices that access corporate data. With work hours and locations ever more flexible, employees want to access corporate data on-the-go, at home and long after “EOD.” BYOD is allowing people to get more done with more freedom, but we now have a gap between employee and employer expectations.

THE INTRANET OF EVERYWHERE: Deploying a search-driven architecture to address intranet challenges

June 4, 2014 No Comments

The purpose of this document is not to compare or evaluate the many intranet solutions on the market today. Instead, we want to shine a light on a challenge organizations face regardless of the intranet solution they ultimately choose.

Innovative Trends Make Mobile App Development More Responsive

May 19, 2014 No Comments

As the array of mobile devices flourish in the market and as mobile applications coded in HTML5 start appearing in abundance, it becomes more essential for mobile app developers to concentrate progressively on the aspect of responsive app schemes. Why? Because amidst an overwhelming number of mobile options/solutions existing in the current hour, the singular code of a responsive design looks like the most tempting universal answer for mobile optimization.

BlackBerry Opens BlackBerry 10 Operating System to Multiple MDM Platforms

May 13, 2014 No Comments

BlackBerry Limited, a world leader in mobile communications, today announced that it will enable mobile device management (MDM) companies to directly manage devices with the BlackBerry 10 operating system.

IT Briefcase Exclusive Interview with Ed Brill, Director, Mobile Enterprise Marketing, IBM

May 9, 2014 No Comments

with Ed Brill, IBM Social BusinessIn this interview, Ed Brill from IBM Social Business discusses mobile as a business transformation tool and considerations for the ‘upwardly mobile’ enterprise. Read More >>>

BYOD Security: 5 Tips for IT Professionals

May 5, 2014 No Comments

by Rick DelGado, Independent AuthorPersonal devices have become a common part of the working environment now. More and more, companies are adopting Bring Your Own Device (BYOD) policies, allowing employees to use their own devices both inside and outside the office.Read More >>>

ADVERTISEMENT

DTX ExCeL London

WomeninTech