Rob Tiffany

Tag Archive: Security

Atlanta

Reduce Corporate Risk by Updating your Win32 Apps to Run on Secure Sandboxed Platforms

Migrate those Visual Basic, Delphi, VisualAge, PowerBuilder, SQL Windows, JBuilder and Visual Cafe Win32 applications to secure sandboxed mobile apps. Hope I didn’t leave out your favorite development tools from the 90s. The Mac stagnated, OS/2 didn’t capture market share…
Read more

St Louis

Reduce Business Risk by Migrating your Legacy Software to Modern, Secure Platforms and Programming Languages

Businesses drag their feet when mobilizing line of business apps via legacy software migration thinking it’s cheaper to maintain a codebase than to rewrite. I get it. Migrating all those apps to mobile seems like eating the proverbial elephant. They…
Read more

Detroit

Improve Employee Productivity at your Company by Implementing a Hybrid Identity Strategy

Identity and Access Management is key to facilitating employee access to corporate and 3rd party resources from any device on any network. Most of you are well-versed at entering user names and passwords to access social media and banking sites…
Read more

Chicago

Reduce Business Risk by Deploying EMM Solutions with Conditional Access Capabilities

EMM solutions that deliver conditional access to desired services like email, storage and cloud services motivate BYOD users to enroll. Let’s face it, your BYOD employees aren’t too thrilled about installing an EMM app, agent or container on their device.…
Read more

Omaha

Reduce Risk to Your Business by Ensuring Your EMM Package can Block Malicious Apps

To prevent malicious apps from attacking corporate assets, get an EMM solution that disables app stores while blacklisting and whitelisting apps. Despite what you’re thinking, malicious apps may be one of the biggest threats your mobile enterprise will face. You…
Read more

Minneapolis

Reduce Business Risk by Using Employee Smartphones and Multi-factor Authentication to Secure Corporate Resources

The perception that employee smartphones are a security liability is misplaced. They’re a multi-factor authentication security asset. It’s clear the things we’ve done in the past to stay secure are no longer sufficient. The pervasive use of usernames and passwords…
Read more

Denver

Reduce Business Risk by Enforcing Security Policies on Data with Digital Rights Management

To enforce data security policies directly, get an EMM solution with digital rights management to protect data where it flows & rests. So far, our EMM journey to secure corporate data has dealt with the issue by broadly securing the…
Read more

Oklahoma City

Reduce Corporate Risk by Enforcing Security Policies on Mobile Apps with MAM

To enforce policies on individual mobile apps, get an EMM solution with MAM capabilities to prevent data leaking from corporate to personal. Mobile App Management (MAM) allows IT departments to protect corporate data without having to manage the whole device…
Read more

Houston

Reduce Company Expenses and Enforce Mobile Security with Exchange Active Sync

If you don’t have an Enterprise Mobility Management solution, start with Exchange Active Sync to enforce device policies and security. Baby steps. While you might not say Microsoft Exchange Server in the same breath as enterprise mobility management, this product…
Read more

Las Vegas

Improve User Experience by Extending Wireless to Customers and Employees

Use Femtocells + mobile broadband routers to extend wireless to customers & employees without coverage in buildings or at remote work sites. It goes without saying that not all organizations are the same. They don’t all reside in offices in…
Read more