Apps That Violate IT Policy – What and How?

Apps That Violate IT Policy – What and How?

Apps That Violate IT Policy Over the last two days we’ve looked at  whether or not Shadow IT is a opportunity or a threat, and the security risks that unapproved apps pose to businesses and organisations. To conclude the mini-series, today we look at a new report that’s been released by Netskope. The ‘Netskope Cloud Report’ typically compiles the most interesting trends on cloud app adoption and usage based on aggregated, anonymised data from the…

Ericsson Turns to Silicon Valley Scientist in Cloud Effort

Ericsson Turns to Silicon Valley Scientist in Cloud Effort

Since starting in March as head of Ericsson’s newly created cloud unit, Jason Hoffman, 42, has helped orchestrate a takeover of a California software provider and struck a partnership with a security company to bolster his division and differentiate its offering. While information-technology giants such as International Business Machines Corp. (IBM), Hewlett-Packard Co. and Microsoft Corp. Read the source article at Yahoo Finance

News: Spanning Is Acquired By EMC Corporation

News: Spanning Is Acquired By EMC Corporation

Company Continues To Do Business as Spanning Cloud Apps in EMC’s Core Technologies Division; Serves as Foundation for EMC’s “Born-in-the-Cloud” Data Protection Strategy AUSTIN, Texas – October 28, 2014 – Spanning Cloud Apps, Inc., the most trusted provider of data backup and recovery for cloud applications, today announced that it has been acquired by EMC Corporation. The company will continue to operate under the Spanning® Cloud Apps brand in Austin, Texas and will be the…

Will Virtual Reality Replace The Virtual Desktop?

Will Virtual Reality Replace The Virtual Desktop?

Ever since Facebook acquired the rapidly growing Oculus Rift, it seems like virtual reality has not stopped gaining attention in the tech world. Virtual reality is becoming more than just a sci-fi special effect as the quality and wearability continue to improve. People like Oliver Kreylos, who works for the Institute for Data Analysis and Visualization at the University of California at Davis, are even pushing virtual reality to mainstream status with enterprise business and…

Do Organisations Face A Security Risk From Apps?

Do Organisations Face A Security Risk From Apps?

Yesterday we looked at the growing area of Shadow IT within organisations. We concluded that even though Shadow IT has the potential to be a force for good, there is still a significant threat posed by the usage of apps that do not align with a company’s security, compliance, reliability, documentation or control. How much of a threat do mobile apps now pose? Is it true that a small device used incorrectly could rapidly become…

Shadow IT – Threat or Opportunity?

Shadow IT – Threat or Opportunity?

Shadow IT Shadow IT – sometimes referred to as Stealth IT – describes the usage of IT systems and solutions that are built and used inside businesses and organisations without explicit approval from IT departments and/or management. Fueled by the growth of BYOD policies, Christopher Rentrop, Professor of Informatics at Konstanz University of Applied Sciences, believes it now includes “all applications that are acquired without the IT department’s involvement and whose use is not covered by IT…

Cloud: Enabling Virtualised Banking Environments

Cloud: Enabling Virtualised Banking Environments

Enabling Virtualised Banking At the outset it is important to understand where cloud will fit into the existing banking landscape and in order to do so, one must first recognize that the biggest development of recent times is the complete transformation and virtualisation of traditional banking services. Emphasis is on the digitisation of products and services; this totally changes the customer experience, allowing the customer to access all bank services anywhere on any device at…