Blog

The release of iOS 10 reflects growing integration of the iPhone into enterprise software and digital transformation initiatives. In this webinar we'll look at successful strategies for leveraging iPhones and iOS including security and mobile device management, application provisioning, network optimization, and wireless LAN evolution....

Announcements from leading technology companies underscore the idea that for most businesses, it's no longer a matter of "if" but "when" applications will shift to the cloud. Read more on NoJitter.com...

At this week's Ignite conference in Atlanta, Microsoft, along with partners Crestron, Logitech, and Polycom announced the first devices as part of the Project Rigel effort announced at Enterprise Connect in early 2016 to enable easier video conferencing within Skype for Business in conference rooms...

Executive Summary IT organizations are moving toward a risk-management approach to information security. But what does that mean, and how can infosec professionals actually implement such an approach? What does it mean to take a “risk-based” approach to security budgeting? Nemertes outlines our Business Risk Portfolio...

[vc_row][vc_column][vc_column_text]Executive Summary Enterprise architects and security managers have often wanted but shied away from secure segmentation of their internal networks. Wanted, in order to provide a much higher level of security against lateral attacks and deeper visibility into network use; shied away from, for fear that...

[vc_row][vc_column][vc_column_text]Enterprises are starting to adopt business chat apps, as they incorporate more robust features. The line is blurring between these apps and more established UC platforms. Read more on SearchUnifiedCommunications.com[/vc_column_text][/vc_column][/vc_row]...

"Immersive group collaboration" brings interactive team meetings into the digital age. Maybe this sounds familiar: You walk into your spiffy new conference room. On one end are two large screens for video conferencing and content projection. If you are lucky, perhaps there's an automatic pan-tilt-zoom camera...

In our 2016/2017 Security and Risk Management Benchmark and Maturity Model, we highlighted a set of "bellwether technologies": Technologies that, we believed, would characterize the most sophisticated security organiztions. By and large, the technologies we selected were, in fact, considerably more likely to be deployed...

I covered VDI closely for many years, several of which were dubbed "The Year of VDI" even though that never quite seemed to gel. Our 2014-2015 Enterprise Technology Benchmark showed VDI adoption by nearly 70% of enterprises, and more importantly VDI use spreading inside those companies to steadily...

Unless you've been living under a rock for the past 8 years, you've been exposed to the concept of IoT. For enterprise organizations, it's a key component of Digital Transformation (DT), primarily because it enables companies to capture huge amounts of data. And "data has value" is one...