Close this search box.

Author: howard.haile

Trust and Outrage Take Center Stage at the 2014 RSA Conference

When wide spread surveillance by the NSA was revealed by Edward Snowden it started a storm of debate around privacy and the destruction of trust in the technologies supporting privacy on the Internet. The debate intensified when allegations surfaced that RSA had taken money in exchange for weakening the Dual EC DRBG encryption algorithm. All of this spilled over to the 2014 RSA Conference being held in San Francisco.

Read More

2014 Mobile Data Management Buyer’s Guide Now Available

DCIG is pleased to announce the release of its 2014 Mobile Data Management (MDM) Buyer’s Guide that weight, score and rank over 100 features. Like previous Buyer’s Guides, this Buyer’s Guide provides the critical information that organizations need when selecting Mobile Data Management software to help meet the security, compliance and Bring-Your-Own-Device (BYOD) challenges in an ever increasing mobile enterprises.

Read More

Four (4) Key Considerations When Acquiring a Mobile Data Management Solution

One of the most pressing needs in many organizations today is the need to effectively manage their growing throng of mobile devices – be they iPads, iPhones, tablets or whatever new mobile device may be coming out next. In that vein, DCIG is preparing to release its inaugural DCIG 2014 Mobile Data Management (MDM) Buyer’s Guide in just a few weeks to help companies better understand what solutions are available to best manage these devices. In today’s blog entry, I share four (4) key items to consider when acquiring an MDM solution.

Read More

The Combination of MDM, MAM and the Cloud will Make for the Best Investment; Interview with Amtel CEO Gupta, Part IV

Security, security, security. The word rings loud and clear in the ears of corporate business owners when it comes to the data and information stored on mobile devices. Allowing employees to bring their own devices (BYOD) may increase productivity but an organization needs to make sure their sensitive information does not become public. In the fourth and final part of my interview with Amtel, Inc. CEO, Pankaj Gupta, we examine the growing trend in enterprises adopting BYOD and the scope of systems management being offered by organizations like Amtel.

Read More

Corporate Ramifications of Implementing Mobile Data Management (MDM) Software for BYODs; Interview with Amtel CEO Pankaj Gupta Part III

Depending upon its size, a company looking to offer their employees the opportunity to bring their own device (BYOD) to work may be faced with choices, such as: How much data to allow on the device? How to manage the data accessed? Whose platform to use? Organizations like Amtel, Inc. have specialized in developing Mobile Data Management (MDM) for such companies. In this third installment of my interview series with Amtel’s CEO, Pankaj Gupta, we discuss hybrid vs. cloud and what it looks like for a company to use MDM for bring your own devices (BYODs).

Read More

Security, Fast Deployment and Managed Services – the Benefits of Using the Cloud for MDM; Interview with Amtel CEO Pankaj Gupta Part II

In the arena of mobile data storage a business has a few options. In choosing which solution is best a company may ask itself, “Is keeping data on premises or putting it in the cloud more cost-effective?” and “Do we feel comfortable using the cloud for our storage needs?” During my first installment with Amtel, Inc. CEO, Pankaj Gupta, we chatted about how companies can adopt an open attitude in the corporate world of bring your own device (BYOD). Now, in my second segment with Amtel’s CEO, we discuss the benefits of storing data in the cloud, how secure cloud storage really is, and how accepting midmarket companies and larger enterprises are of putting their data in the cloud.

Read More

Putting a Secure “Edge” on Enterprise Mobility

Anytime, anywhere, any device access to data is highly desirable for enhancing the productivity of an increasingly mobile workforce. But, if left to the end user, this enhanced access can create new headaches for IT and risks for the enterprise which has the responsibility to protect corporate data and comply with externally-imposed data management and eDiscovery requirements. To balance these user and business needs for access with enterprise needs to control data risks, CommVault now gives enterprises the tool they need to control this common problem as part of its most recent “Edge” Simpana release for laptops and desktops.

Read More

How Companies Can Adopt an Open Attitude in the Corporate World of BYOD: Interview with Amtel, Inc. CEO Pankaj Gupta, Part I

Not long ago, organizations did not even dream about the need to geo-fence within their business nor did they ponder the security risk involved in managing the company data on mobile devices. But times they are a changin’. Corporate America is seeing a massive shift in favor of users/employees bringing their own devices (BYOD) to work. Does this prove a benefit or a deficit for the company? In this first installment of my interview series with Pankaj Gupta, CEO of Amtel, Inc., we discuss the upside for a company allowing BYOD and how Amtel is set to support a company’s move toward this popular trend.

Read More

New Solutions to Antivirus are Pushing Defense-in-Depth to the Network Edge

Security-in-depth is rarely discussed without including desktop antivirus with antivirus software being a cornerstone of corporate network protection since the advent of the computer virus. The danger that antivirus software presents is that within most organizations it presents the last line of defense so any threat capable of breaching this defense has the ability to wreak havoc within the enterprise.

Read More

The Four Factor Test to Determine Whether Corporate Email is Protected by Attorney-Client Privilege

The issue of attorney-client privilege remains one of the most revered privileges that the American judicial system bestows upon clients as it enables any person to communicate open and honestly with his/her attorney. Now this right is under scrutiny as keeping communications between a defendant and his/her attorney has become difficult to achieve due to the increased role that email plays as a form of primary communication medium between them.

Read More

Click Here to Signup for the DCIG Newsletter!


DCIG Newsletter Signup

Thank you for your interest in DCIG research and analysis.

Please sign up for the free DCIG Newsletter to have new analysis delivered to your inbox each week.