Migrate those Visual Basic, Delphi, VisualAge, PowerBuilder, SQL Windows, JBuilder and Visual Cafe Win32 applications to secure sandboxed mobile apps. Hope I didn’t leave out your favorite development tools from the 90s. The Mac stagnated, OS/2 didn’t capture market share and the inexpensive, developer-friendly Windows platform benefited. Companies all over the world deployed Windows 3.1 and then Windows 95 and NT. Easy to use, drag and drop development tools meant you didn’t have to have a computer science degree to build powerful apps. Desktop apps of varying quality spread like wildfire. Apps back then could manipulate the operating system, talk directly to other apps and perform all kinds of insecure, destabilizing

close

Migrate those Visual Basic, Delphi, VisualAge, PowerBuilder, SQL Windows, JBuilder and Visual Cafe Win32 applications to secure sandboxed mobile apps. Hope I didn’t leave out your favorite development tools from the 90s. The Mac stagnated, OS/2 didn’t capture market share and the inexpensive, developer-friendly Windows platform benefited. Companies all over the world deployed Windows 3.1 and then Windows 95 and NT. Easy to use, drag and drop development tools meant you didn’t have to have a computer science degree to build powerful apps. Desktop apps of varying quality spread like wildfire. Apps back then could manipulate the operating system, talk directly to other apps and perform all kinds of insecure, destabilizing

Read more

Businesses drag their feet when mobilizing line of business apps via legacy software migration thinking it’s cheaper to maintain a codebase than to rewrite. I get it. Migrating all those apps to mobile seems like eating the proverbial elephant. They cost a lot of money to build, the highly-skilled developers needed to rewrite the code are harder to find than ever, the code isn’t commented and there aren’t any docs. This often leads to IT decision makers putting off these projects, perhaps until it’s not their problem anymore. So why do it? For starters, your employees will be significantly more productive running your apps on the mobile devices they actually use.

close

Businesses drag their feet when mobilizing line of business apps via legacy software migration thinking it’s cheaper to maintain a codebase than to rewrite. I get it. Migrating all those apps to mobile seems like eating the proverbial elephant. They cost a lot of money to build, the highly-skilled developers needed to rewrite the code are harder to find than ever, the code isn’t commented and there aren’t any docs. This often leads to IT decision makers putting off these projects, perhaps until it’s not their problem anymore. So why do it? For starters, your employees will be significantly more productive running your apps on the mobile devices they actually use.

Read more

Identity and Access Management is key to facilitating employee access to corporate and 3rd party resources from any device on any network. Most of you are well-versed at entering user names and passwords to access social media and banking sites from your desktop browser. Based on the identity you provide; you’re given access to those sites. Some of you in the corporate world might know what it means to join your computer to a Domain. Your company has you do this so you only have to enter your credentials once, while getting access to multiple servers. This is called single sign-on (SSO) and it uses a directory service. With people moving

close

Identity and Access Management is key to facilitating employee access to corporate and 3rd party resources from any device on any network. Most of you are well-versed at entering user names and passwords to access social media and banking sites from your desktop browser. Based on the identity you provide; you’re given access to those sites. Some of you in the corporate world might know what it means to join your computer to a Domain. Your company has you do this so you only have to enter your credentials once, while getting access to multiple servers. This is called single sign-on (SSO) and it uses a directory service. With people moving

Read more

To prevent malicious apps from attacking corporate assets, get an EMM solution that disables app stores while blacklisting and whitelisting apps. Despite what you’re thinking, malicious apps may be one of the biggest threats your mobile enterprise will face. You might believe that device encryption, the use of a PIN to logon and utilizing a VPN to connect to your corporate network means your safe. You’re not. Within the security envelope your device has created, a rogue app could still drive a truck through your VPN tunnel and attack internal assets. Users routinely download apps without paying attention to the list of permissions and capabilities the app is asking for. They

close

To prevent malicious apps from attacking corporate assets, get an EMM solution that disables app stores while blacklisting and whitelisting apps. Despite what you’re thinking, malicious apps may be one of the biggest threats your mobile enterprise will face. You might believe that device encryption, the use of a PIN to logon and utilizing a VPN to connect to your corporate network means your safe. You’re not. Within the security envelope your device has created, a rogue app could still drive a truck through your VPN tunnel and attack internal assets. Users routinely download apps without paying attention to the list of permissions and capabilities the app is asking for. They

Read more

The perception that employee smartphones are a security liability is misplaced. They’re a multi-factor authentication security asset. It’s clear the things we’ve done in the past to stay secure are no longer sufficient. The pervasive use of usernames and passwords to authenticate with every kind of system on the planet is breaking down. Passwords aren’t strong enough and no one can remember them all. Some companies require something called two factor authentication in order to access their computer systems. This dramatically increases security because you’re required to have something like a smartcard and know something like a PIN in order to gain access. The downside is that everyone has to have

close

The perception that employee smartphones are a security liability is misplaced. They’re a multi-factor authentication security asset. It’s clear the things we’ve done in the past to stay secure are no longer sufficient. The pervasive use of usernames and passwords to authenticate with every kind of system on the planet is breaking down. Passwords aren’t strong enough and no one can remember them all. Some companies require something called two factor authentication in order to access their computer systems. This dramatically increases security because you’re required to have something like a smartcard and know something like a PIN in order to gain access. The downside is that everyone has to have

Read more