What’s the issue with BYOD? Data Control… What’s the issue with Data Sharing? Data Control!
- I had an interesting experience a few weeks ago. I went to NYC to brief with CA Technologies. I spent a full day speaking in group sessions with some of its top executives including CEO, Mike Gregoire, EVP Technology and Development, Peter Griffiths, EVP Strategy and Corporate Development Jacob Lamm, as well as a 1 on 1 meeting with GM of Security Management Mike Denning,. I found their discussions and candor on the changes and advancements within CA VERY refreshing; more so than I would have expected from what I perceived as a “monolithic behemoth” such as CA.
I just got off the phone with a reporter from a major industry trade magazine (no names please!) who is preparing an article on enterprise mobile device adoption. Wanting to help ensure accuracy in the reporting, I provided him with statistical details from our recent research into the use of mobile devices in the enterprise and stepped him through the findings. He was fascinated by the results and asked lots of follow-up questions. In the end, however, he admitted he would likely not be able to use any of the information in his article (say what?!). Apparently, his editor had specifically tasked him with writing an article showcasing how tablets are rapidly replacing PCs in the workplace, even though this is completely contradictory to reality.
Recently I briefed with ForeScout Technologies, a Network Admission/Access Control (NAC) vendor, to get an update on the CounterACT platform it has been delivering and developing for a few years and to see its recently announced ControlFabric technology. I thought it wise to take another look at NAC vendors and how they address BYOD, rogue, or non-compliant devices that can be the source of many compliance and security headaches including advanced/targeted threats.