Gaining Data Control with BYOD and Bluebox

By David Monahan on Apr 22, 2014 10:51:06 AM

What’s the issue with BYOD? Data Control… What’s the issue with Data Sharing? Data Control!

Continue Reading

CA Analyst Symposium- CA is Changing

By David Monahan on Mar 3, 2014 6:39:56 PM

I had an interesting experience a few weeks ago.  I went to NYC to brief with CA Technologies.  I spent a full day speaking in group sessions with some of its top executives including CEO, Mike Gregoire, EVP Technology and Development, Peter Griffiths, EVP Strategy and Corporate Development Jacob Lamm, as well as a 1 on 1 meeting with GM of Security Management Mike Denning,.  I found their discussions and candor on the changes and advancements within CA VERY refreshing; more so than I would have expected from what I perceived as a “monolithic behemoth” such as CA.
Continue Reading

Don’t Believe Everything You Read – Especially About Enterprise Mobility!

By Steve Brasen on Jan 17, 2014 11:12:53 AM

I just got off the phone with a reporter from a major industry trade magazine (no names please!) who is preparing an article on enterprise mobile device adoption. Wanting to help ensure accuracy in the reporting, I provided him with statistical details from our recent research into the use of mobile devices in the enterprise and stepped him through the findings. He was fascinated by the results and asked lots of follow-up questions. In the end, however, he admitted he would likely not be able to use any of the information in his article (say what?!). Apparently, his editor had specifically tasked him with writing an article showcasing how tablets are rapidly replacing PCs in the workplace, even though this is completely contradictory to reality.

Continue Reading

ForeScout Technologies has a Knack for NAC (and more) with ControlFabric and CounterACT

By David Monahan on Jan 16, 2014 8:35:02 PM

Recently I briefed with ForeScout Technologies, a Network Admission/Access Control (NAC) vendor, to get an update on the CounterACT platform it has been delivering and developing for a few years and to see its recently announced ControlFabric technology.  I thought it wise to take another look at NAC vendors and how they address BYOD, rogue, or non-compliant devices that can be the source of many compliance and security headaches including advanced/targeted threats.

Continue Reading
  • There are no suggestions because the search field is empty.

Lists by Topic

see all

Posts by Topic

see all

Recent Posts