October 31st, 2013
According to a report from research firm Gartner, Inc., worldwide information technology spending is estimated to hit $3.8 trillion in 2014. That figure represents a 4 percent increase over the total spent in 2013.
I’ll leave it to you to read the article for further insight, but one quote from Gartner’s Peter Sondergaard, senior vice president and global head of research, resonated quite strongly with me, so I’ll share it with you now: “The security of embedded technologies that your organization has right now may be the most important operational responsibility you will have in 2020.”
True, 2020 is more than six years away, but between now and then expect a steady increase in the volume of news headlines regarding the heightened importance of securing your company’s networked embedded devices.
Also, I encourage you to learn more about what we’re doing from a technology standpoint to ensure our devices help you stay ahead of the security curve. Visit our Xerox ConnectKey page for additional information.
October 15th, 2013
Recent research by independent security consultancy Context Information Security, as reported in this Dark Reading article, highlights an important finding regarding enterprise bring-your-own-device (BYOD) implementation: There will always be a trade-off between convenience and security.
The researchers investigated three leading Mobile Device Management (MDM) solutions commonly deployed as part of many BYOD roll-outs with Android and iOS mobile devices. Each of the three MDM solutions was shown to provide adequate BYOD security, but like any comparable offering, they were found to be limited by the operating system on which they’re applied.
From the article:
“For example, MDM solutions in a BYOD environment cannot prevent unknown malicious applications from recording sound via the phone’s microphone or tracking user location using the built in GPS. And while Jailbreak/Root detection is implemented by all the MDM solutions reviewed, they work in very much the same way as antivirus, only detecting known Jailbreak/Root methods and applications, which are often trivial to bypass by technical users or malicious hackers. Implementation weaknesses of MDM solutions may also inadvertently leak sensitive information and users can compromise security by downloading apps and disregarding operating system permissions requested by the applications.”
And while there’s no surefire method of guaranteeing comprehensive security in an enterprise BYOD environment, the combination of technical security controls and a clearly articulated BYOD user policy will help dramatically limit the risks.
Embedded devices, such as office printers and MFPs, are another key BYOD-security consideration when users are onsite with their personal smartphones or tablets. Which is why Xerox ConnectKey devices help lessen the demands placed on IT staff, delivering worry-free BYOD connectivity so administrators can focus on preventing other, potentially more damaging security threats.
September 19th, 2013
A new post on Spiceworks by Shell Haffner, manager of product marketing for the Xerox Entry Products Business Group, asks IT administrators to consider whether they’re in charge of mobile security, or if they trust their employees to ensure mobile-device security in our nascent BYOD world.
Data security obviously is a critically important issue, so I encourage you to read the Spiceworks article and then join the discussion.
July 23rd, 2013
This Thursday, 7/25 at 11 a.m. Pacific time, experts from security-industry leader McAfee will host a Twitter chat to discuss today’s security-threat landscape regarding embedded devices in the office.
This year’s launch of the Xerox ConnectKey lineup of printers and MFPs showcases our partnership with McAfee that provides embedded security and advanced whitelisting technology as part of the McAfee security offering.
The upcoming Twitter chat is a great opportunity for our readers because, even today, many businesses and IT professionals lack the information necessary to ensure embedded devices such as printers and MFPs—and the business-critical data they contain—are effectively safeguarded against malicious, Internet-based threats.
The McAfee Twitter chat will address various security-related topics, including:
- Examples of embedded devices that may be overlooked with regard to security.
- Common embedded-device security gaps, and those most critical to address promptly.
- Barriers to achieving tighter embedded-device security adherence.
- Embedded-device security best practices.
This is a great opportunity for those interested in or responsible for business-data security to learn from top industry experts, who look forward to answering your questions.
Visit the McAfee Business page on Twitter to join the conversation this Thursday, 7/25, at 11 a.m. Pacific time.
July 18th, 2013
As a follow-up to the recently published Business of Work article, “A New Paradigm: Consumerization of IT Driving Bottom-Up Disruption,” I found a Wired.com piece that provides timely insight into how CIOs in the enterprise can best position their companies to accommodate the rapidly increasing number of anywhere, anytime, any-device workers.
The article, “The New Mobile Enterprise: Less is More,” explores the concept of Unified Communications through what’s called Fixed Mobile Convergence.
If those terms are new to you, they were to me as well. But the Wired piece does a good job of explaining the concepts, as well as outlining the ways in which Fixed Mobile Convergence (FMC) is key to enabling the new mobile enterprise.
In summary, FMC allows enterprises to:
- Reduce telecommunications costs
- Reduce management complexity
- Accelerate adoption of mobile Unified Communications
It all comes down to an enterprise finding the path of least resistance when transforming into a business that embraces and benefits from what’s sure to become an almost ubiquitous mobile workforce.
From the article:
“The New Mobile Enterprise is about enabling enterprises to support the ‘anytime, anywhere, any device’ needs of the increasingly mobile workforce. The path to this objective involves more devices and options for end-users, but will also come down to communicating and collaborating with ‘less’ complexity and costs.”
July 16th, 2013
In the increasingly influential world of IT consumerization, enterprise IT decision-makers need to gain a better understanding of the factors that drive employees to prefer personal devices for work-specific tasks.
We’re in an age of rapidly evolving mobile hardware, with countless productivity-enhancing apps available either free or affordably, and the emergence of The Cloud as a powerful data and utility repository that promises to continue making mobility not only increasingly feasible, but more the norm than the exception for the global workforce.
But IT executives aren’t the ones making the push toward employee mobility. They understand the “bring your own device” (BYOD) phenomenon is in its infancy and isn’t going away. But they’re stuck in a reactionary mode that’s ripe for disruption whenever their workforce embraces the latest-greatest mobile device and/or work-process-specific software.
Burrus’ LinkedIn article provides a thorough reporting of the facts and figures regarding the widespread disconnect between the employees that are driving the shift toward workplace mobility and BYOD, and the executive-level decision-makers who continually find themselves playing catch-up.
If you’re in a position of influence at the enterprise level, understanding the key factors (both human and technological) spurring the mobility revolution is a critical necessity when evolving from reactive to proactive IT decision-maker.
It’s about having an infrastructure in place that supports your workforce’s desire to increase productivity using their own devices. Certainly, mobile printing and data security are major considerations, among many others.
Which is why I’m proud to say that when it comes to BYOD-ready multifunction printer technology, Xerox is leading the way.
Visit our Xerox® ConnectKey® website to learn more about the ways in which ConnectKey technology helps enterprise customers stay ahead of the workplace-mobility curve.
Another consideration for those implementing mobile-worker-friendly policies and appropriate technologies is how to store and provide access to company data and content in a way that ensures the integrity and security of business-critical assets.
To that end, I encourage you to read the Real Business at Xerox blog post, “Tackling BYOD Concerns With A Mobile Enterprise Content Management Solution.” The article provides helpful insight into the benefits provided by a secure, mobile-accessible enterprise content management (ECM) system.
June 27th, 2013
Following up my earlier post regarding some of the ways in which companies should focus their employee-retention efforts, this InfoWorld article discusses what employers should do when staff leaves with personal mobile devices tied into the employers’ network infrastructure.
Whether because of a layoff, termination or resignation, companies could be at risk if sensitive data walks out the door with a departing employee.
From the piece: “As more workplaces embrace BYOD practices, they’ll increasingly confront the question of how to balance the benefits of a self-provisioned workforce against the risks of company assets walking out the door when workers are let go. What can IT departments currently do to minimize risk when BYOD-practicing employees are laid off? What practices and policies can they put in place to make future departures as smooth as possible?”
It’s an interesting situation, for sure—and one that’s only going to become more prevalent as the BYOD trend continues its upward trajectory.