Nsauditor Network Security Auditor - Advanced All-In-One Network Tools Suite!
  Recommended Product
Network Security Audit Software
Network Security Audit Software and Computer Security Tools
Download Learn More
Nsauditor Screencast
 
 
  Network Security Software
Network Bandwidth Monitor Network Bandwidth Monitor
NBMonitor tracks Internet bandwidth usage (upload and downloads) and shows process names initiated network connections...
Network Hardware Inventory Software Network Hardware Inventory Software
Nsasoft Hardware Software Inventory is a powerful network inventory software for home, office and enterprise networks...
BlueAuditor Monitors Mobile Devices in Wireless Network BlueAuditor Monitors Mobile Devices in Wireless Network
BlueAuditor is a wireless personal area network auditor and easy-to-use program for detecting and monitoring mobile devices in a wireless network...
Network Access Monitoring Network Access Monitoring
ShareAlarmPro allows easily perform network shares and folder monitoring, block unwanted users attempting to access secured shares...
Network Shares Monitoring Network Share Watcher
Monitors network folders permissions and identify shares which are violating company data access policy...
NetworkSleuth Network File Search Utili NetworkSleuth Network File Search Utiliy
NetworkSleuth is a network file searching utility, that allows you to quickly locate files across a network....
Product Key Finder Product Key Finder
Product Key Explorer enables you to quickly recover over 3000 popular software product keys from network computers...
Backup Key Recovery Crashed Drive Keys Recovery Backup Key Recovery Crashed Drive Keys Recovery
Backup Key Recovery retrieves product keys for Windows, MS Office, SQL Server, Adobe products and more than 2500 popular software products...
 
 

Network Security News

BYOD movement is forcing IT to adapt

Jan 16, 2012 | ITNews.com

IT departments in the age of mobile computing must adapt to newly empowered users who select not only their own devices but their applications as well. This adapation -- as difficult as it may seem -- has a strong benefit: Enabling a modern workforce, said Maribel Lopez, president of Lopez Research at the AppNation conference last week in San Francisco.

"You can look at it [from the perspective that] BYOD is taking control away from IT, or you can look at it as it's an opportunity to mobilize your entire business that you would have never been able to afford before because you wouldn't have bought the devices and you wouldn't have wanted to manage them," Lopez said. Her advice to IT: "Accept that BYOD is happening and build a plan around it -- how to manage it, how to secure it, how to get apps to devices."

Users are bringing in their own devices and choosing applications such as Box.net for file sharing and DocuSign for electronic document signatures, without waiting for IT signoff, noted Ken Singer, CEO of MDM (mobile device management) provider AppCentral. "CMOs and CEOs were coming in with their own iPads and demanding that the IT departments support these devices."

Such pressures mean a new reality for IT, a reality many will not like, Singer said. He likened IT's crumbling power vis à vis mobile adoption to last year's "Arab spring," in which people in Middle Eastern countries rose up against entrenched, autocratic leaders. "IT is struggling with how to address this, how to look at this, and what they should do to respond because they can't simply say yes to everything," he said. "They can't manage it all."

IT must understand that businesspeople are going to build applications, with mobile applications serving as a catalyst for changes, said Ojas Rege, vice president of products and marketing at MDM provider MobileIron. "In the past, the business wanted apps, but they just didn't have the mechanism to build them." Instead, they had to rely on line-of-business applications, such as SAP or Siebel. "Now, it's really easy for them to go and build them or buy them," Rege said.

IT is concerned that such "foreign" apps create security risks, but Lopez said that MDM and mobile application management tools can let IT departments be more flexible about such apps. However, she argued that flexibility did not mean a free-for-all: "Some apps today are not appropriate."

View more news...

 
  Most Popular Articles
 
 
  Email Subscriptions
Enter Your Email to be Notified of Software Updates:

 
 
  Popular Searches
network security magazine network security auditor network security news network security software corporate network security network security systems home network security product key finder password recovery software Network Bandwidth Monitor Network Access Monitoring data access policy monitoring remote shutdown Network File Search key recovery Network Monitoring Computer Security Ethical Hacking Network Security Network Inventory Software Information Security
 
 
  Partner Sites
Network Security Auditor
Nsauditor is a complete networking utilities package that includes more than 45 network tools and utilities for network auditing, scanning,network connections monitoring and more. For more information, please visit:
www.nsauditor.com


Password Recovery Software
SpotAuditor is All-in-one password recovery program that offers administrators and users a comprehensive solution for recovering passwords and other critical business information saved in users' computers. For more information, please visit:
www.password-recovery-software.com

Product Key Explorer
Product Key Explorer quickly recovers and displays product key, including Windows 7 keys, Windows Vista key, Windows XP product key, Microsoft Office 7 product key, MS office 2010 key, Adobe Photoshop, Adobe CS5, CS4, CS3, SQL Server, Electronic Arts games and more than 3000 popular software products:
www.product-key-explorer.com/