The Cloud is Dead, Long Live the Edge

fog

We interrupt your regularly scheduled migration to the cloud to bring you a much more important megatrend called the Internet of Things.

The Internet of Things demands a low-latency, distributed, peer-to-peer environment that can only be found in the fog layer via edge computing.

It’s Time to Dump your 1990s App Authentication

Orlando

Migrate Win32 applications secured by client/server database logins to mobile apps that use OAuth & enterprise cloud directories for authentication instead.

Do you know Scott Tiger? Are you familiar with SA and no password? If so, you probably worked with client/server database security mechanisms from companies like Oracle, Microsoft, IBM and others. Anyone who’s built client/server, multi-tier database systems over the years has worked with Oracle Net Listener, TNSNames, Sybase DBLIB, ISAM and VSAM drivers plus a revolving door of Microsoft drivers. App logins were typically the same as the database login. DBAs were in control and app developers worked with what they were given. Sometimes data access was secured through the use of views or stored procedures. Things improved when databases started supporting integrated authentication where data access could be controlled by users and groups found in the company Active Directory.

Today’s mobile apps don’t connect to client/server databases this way. Win32 apps connecting via the LAN or VPN can kick the can down the road a bit longer. Everything else talks to databases with web APIs or sync. While these mobile-friendly APIs use database authentication to connect, the services they expose must be secured by an enterprise directory. This pattern provides identity management to mobile apps. Furthermore, cloud-based enterprise directories must be kept in sync with existing on-premises directories to keep the login procedures seamless for employees. Add multi-factor authentication to boost security and avoid consumer auth providers like Facebook or Twitter.

Reduce risk to your organization by decoupling app security from database authentication and make the move to company-wide directory services. Has your employer switched all its enterprise apps to modern authentication methods yet?

Learn how to digitally transform your company in my newest book, “Mobile Strategies for Business: 50 Actionable Insights to Digitally Transform your Business.”

Book Cover

Click to purchase a copy of my book today and start transforming your business!

Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany

Reduce Business Risk by Deploying EMM Solutions with Conditional Access Capabilities

Chicago

EMM solutions that deliver conditional access to desired services like email, storage and cloud services motivate BYOD users to enroll.

Let’s face it, your BYOD employees aren’t too thrilled about installing an EMM app, agent or container on their device. It feels like an intrusion on one of your most personal possessions and breeds mistrust. That said, the BYOD world is all about gives and gets. Unless your company enforces a corporate-liable policy and buys every employee a smartphone, a compromise must be made to ensure the security of corporate data. This is where the use of the carrot comes into play.

While the BYOD trend was initially about allowing employees to use their mobile devices for work, the trend has shifted. Now you encourage your employees to use their devices because it makes them more productive anywhere, anytime. Whether your company is just allowing or actually encouraging employees to use their devices for work, you have to overcome the “hassle factor” and suspicions of company spying that deters them from EMM enrollment.

First, your Mobile COE must perform exhaustive due diligence to select the most unobtrusive EMM package available with the fewest steps to install that still meets your company’s needs. Next, this system must prohibit access to the systems, apps and data employees want most until they enroll. Some packages even limit access via MAM functionality. Anyway, if you want email, you have to enroll. If you want to access SharePoint, you have to enroll. You get the idea. Gives and gets.

Reduce risk to your business by restricting corporate system access to only those devices enrolled in an EMM solution. What is your company doing to prevent unmanaged devices from accessing sensitive data?

Learn how to digitally transform your company in my newest book, “Mobile Strategies for Business: 50 Actionable Insights to Digitally Transform your Business.”

Book Cover

Click to purchase a copy of my book today and start transforming your business!

Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany

Reduce Business Risk by Using Employee Smartphones and Multi-factor Authentication to Secure Corporate Resources

Minneapolis

The perception that employee smartphones are a security liability is misplaced. They’re a multi-factor authentication security asset.

It’s clear the things we’ve done in the past to stay secure are no longer sufficient. The pervasive use of usernames and passwords to authenticate with every kind of system on the planet is breaking down. Passwords aren’t strong enough and no one can remember them all. Some companies require something called two factor authentication in order to access their computer systems. This dramatically increases security because you’re required to have something like a smartcard and know something like a PIN in order to gain access. The downside is that everyone has to have a smartcard with cryptographic information on an embedded chip as well as a smartcard reader plugged into a PC to make this work. How likely is it that everyone on a global scale has this kind of gear? Not very.

It makes you wonder if there’s some kind of device carried by almost every human on the planet that could substitute for a smartcard? Seek out cloud and on-premises systems that work with devices to implement modern security features like multifactor authentication. Now when an employee enters their corporate credentials, the system will call their phone and require them to dial in an additional PIN to prove it’s actually them who’s trying to access corporate resources. A bad actor who may have stolen your credentials won’t have your phone to answer the call or know your PIN. It’s also unlikely they’ll have your face or fingerprint if you’ve enabled biometric security.

Reduce risk to your business by having employees use their smartphones to prove their identity when attempting access to corporate resources. What is your company doing to secure its business-critical resources?

Learn how to digitally transform your company in my newest book, “Mobile Strategies for Business: 50 Actionable Insights to Digitally Transform your Business.”

Book Cover

Click to purchase a copy of my book today and start transforming your business!

Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany

Rob Tiffany Named Among Top 30 Technology Influencers in Major Report

Industry Analysts

I’m thrilled to be included in this group of technology influencers and luminaries like Werner Vogels, Steve Wozniak and Mark Russinovich.

To become one of those technology influencers, it’s taken a lot of years of hands-on experience building mobile, cloud and Internet of Things solutions combined with writing books, speaking at conferences around the world, blogging, tweeting and mentoring.

Top Technology Influencers

Check it out at: https://apollotarget.com/the-top-15-industry-analysts-usa/

Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany

Digital Transformation Expert Interview

RobKevinDigital

Kevin Benedict from Cognizant’s Center for the Future of Work interviews Rob Tiffany on where Digital Transformation is taking the business world.

Kevin drills into the current unrealized upside with digital transformation efforts and Rob takes a deep dive on Machine Learning, the Cloud, Agile development, Mobile and the Internet of Things.

Learn more from Kevin at The Center for the Future of Work 

Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany

Improve User Productivity by Utilizing Cloud Services to Better Serve Mobile Employees

Mobile employees working around the world are best served by globally distributed cloud services + replicated data with low network latency.

Your organization may have customers and employees distributed all over the world. These people have neither the time nor the patience to wait for data to travel great distances over land or though undersea cables. If your business is currently serving your constituents via an on-premises network or a regional data center, you’re not being responsive to their needs.

Take advantage of services provided by top-tier cloud providers with data centers distributed throughout the world. Narrow your list based on analyst and other trusted reviews of Platform as a Service (PaaS/Cloud development) and Infrastructure as a Service (IaaS/Virtualization) capabilities. Further narrow the list based on network capacity, redundancy, disaster recovery, data handling, support your existing server operating systems, databases, programming languages, and connectors to line of business systems.

Whether lifting and shifting existing systems or building new ones in the cloud, you must go beyond just load-balancing within one or two data centers. Your websites and APIs must be distributed globally so customers and employees are automatically directed to the nearest data centers for the best performance. Additionally, the databases that power these systems must be replicated everywhere so everyone is looking at the same data. One word of caution I’d pass along is to be cognizant of data sovereignty requirements that may limit data flow to a particular region or country.

Improve user productivity and increase revenue by providing fast and reliable access to corporate data to employees anywhere in the world. What is your organization doing to support its global workforce?

Learn how to digitally transform your company in my newest book, “Mobile Strategies for Business: 50 Actionable Insights to Digitally Transform your Business.”

Book Cover

Click to purchase a copy of my book today and start transforming your business!

Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany

Reduce Corporate Expenses by Turning your Intranet Inside Out and Sending it to the Cloud

San Francisco

Seriously, get out of the Intranet business and upload it to the cloud.

The advent of local area networks (LANs) and computers acting as server nodes led to the concept of the corporate network. It began with file shares and print servers that everyone on the network could access from their PC. Over time, these servers became adept at running their own applications which took us to the client/server era. When the web exploded in the mid-1990s, these computers hosted web servers and a private version of the Internet was born called the Intranet. Since then, most companies have built out hundreds of internal web sites and portals to serve the needs of their employees. As employees became more mobile, secure remote access technologies were created to allow them to get inside. It’s time to turn things inside out.

Today, your trusted corporate network secured by perimeter devices such as firewalls is no more secure than the cloud. In the cloud, corporate data and applications can be accessed from anywhere on any device based on an employee’s identity. Multifactor authentication against cloud directories layered with secured connections and devices grants employees fine-grained access to different enterprise resources. Along the way it eliminates conventional virtual private network connections into the corporate network. Cloud storage, RAM, and CPU can drive enterprise workloads that would be cost prohibitive and slow to provision on-premises. Purchasing, provisioning, maintaining and securing an Intranet is a thing of the past.

Reduce risk and cut expenses by moving Intranet assets to a secure cloud you no longer have to manage yourself. How much progress has your organization made in migrating to the cloud?

Learn how to digitally transform your company in my newest book, “Mobile Strategies for Business: 50 Actionable Insights to Digitally Transform your Business.”

Book Cover

Click to purchase a copy of my book today and start transforming your business!

Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany

Reduce Business Risk by Protecting Corporate Assets and IP from BYOD Employees

Los Angeles

Send “Bring your own Device” BYOD employees to the Internet via a separate Wi-Fi network versus giving them direct access to internal servers.

Many companies today have a guest network. This is a separate Wi-Fi network that visitors use to access the Internet when they come meet with employees. Some of these guest networks require a password given to them by the person at the front desk and others don’t use security.

Now imagine a guest network on steroids serving all your mobile employees when they’re in the office and extending the data plans on their personal devices.

I’m sorry, but I still don’t believe in the concept of the trusted enterprise wireless network where mobile employees have direct access to internal servers. Compromised mobile devices and apps can unwittingly attack those networks and servers. Send them out to the Internet and have them come back into the Intranet through a secure path. Your company has already spent a lot of time and effort creating a secure Extranet for employees who need remote access. Put your reverse proxies, firewalls, routers, VNETs and switches to use for all mobile employees. Instead of maintaining two classes of access to internal resources, just reuse the one you already have.

Moving into the future, Intranet resources will disappear as everything migrates to the cloud. Concepts like remote access and internal servers will vanish and your super-fast guest network will look like a stroke of genius.

Reduce Risk to you corporate assets and intellectual property by blocking direct Wi-Fi access to Intranet resources. Is your organization allowing employees to access internal servers with their personal mobile devices?

Learn how to digitally transform your company in my newest book, “Mobile Strategies for Business: 50 Actionable Insights to Digitally Transform your Business.”

Book Cover

Click to purchase a copy of my book today and start transforming your business!

Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany

Improve Employee Productivity by Enhancing Corporate Infrastructure to Support BYOD

SanDiego

The “Bring your own Device” (BYOD) phenomenon has moved employees from 1:1 PC computing to 5:1 mobility requiring enhanced infrastructure & cloud workloads.

More and more BYOD employees are using their own laptops, tablets and smartphones to access corporate data, apps and other services to do their jobs. It started with email in the early 2000s, progressed to synched calendars and contacts, the mobile web and then an explosion of apps. This transformation took employees from Ethernet-connected PCs to multiple, wireless-connected mobile devices.

Imagine you live in a city with 100,000 citizens. Over the course of just a few years, the population swells to 500,000. Asleep at the wheel, city leaders and civil servants didn’t build new roads, add mass-transit, increase the sewer systems or deploy new power cabling to meet the needs of this larger city. This reflects the infrastructures of most corporations today.

The BYOD tsunami combined with the impact of the Cloud and IoT requires significant infrastructure upgrades in order to cope:

  • More bandwidth via redundant, Internet connected and private fiber circuits.
  • Faster routers, switches, proxies and firewalls with increased capacity.
  • A managed Wi-Fi infrastructure using multiple channels, higher access point density and the most bandwidth possible.
  • Dramatically beefed-up DNS, email and line of business servers with shorter DHCP leases.

Improve User Productivity by building a corporate infrastructure that supports the unique needs of today’s BYOD workforce. What kinds of improvements has your organization made to its infrastructure to handle of onslaught of mobile and IoT devices?

Learn how to digitally transform your company in my newest book, “Mobile Strategies for Business: 50 Actionable Insights to Digitally Transform your Business.”

Book Cover

Click to purchase a copy of my book today and start transforming your business!

Sharing my knowledge and helping others never stops, so connect with me on my blog at http://robtiffany.com , follow me on Twitter at https://twitter.com/RobTiffany and on LinkedIn at https://www.linkedin.com/in/robtiffany