Security for Tablets: The Case for Samsung KNOX

samsung_knox_tablet security

The Great Device Proliferation

Enterprises want to empower staff to decide how best to get their jobs done. This often means working hours, venues, and devices of their own choosing. Among workers, 61% report working away from the office at least part of the time. [Read more…]

More with less: supporting the expansion of Unified Communications

More with less: supporting the expansion of Unified Communications

Any discussion of unified communications begins by looking at the struggles IT organizations face today, says Wiam Girgis, Softchoice Senior Solutions Architect.

That’s because, he notes, unified communications solutions—the integration of voice, video, mobility and presence services across endpoints, devices, and applications—are helping organizations to overcome some of today’s most significant challenges, in particular doing more with less.

“Many organizations are trying to expand their business while containing or reducing expenses,” he notes. “Many businesses have remote workers or are looking to expand customer service across multiple geographic locations, so the need for unified communications becomes more important.”

And, like compute and storage, organizations are moving communications to the cloud to seek flexibility and efficiency. Because of this, Girgis adds, “Businesses are finding appeal in solutions that take their communications far beyond the dial tone.”

This blog is part of a three-part Cisco ‘Ask an Expert’ series that looks at how hybrid IT is influencing the technology topics of the network, data center, and unified communications. We discuss with Girgis the benefits of unified communications, but also look at the challenges organizations face around successfully deploying unified communications (UC) solutions on their networks.

[Read more…]

Barracuda Networks: Making Business Disruption and Data Loss a Thing of the Past

barracudaThis article is the third in a five-part series profiling companies leading the field in disruptive technology

Threats to organization’s data become more sophisticated and insidious with every year, forcing companies to look at security from different angles and more holistically. Many security professionals and companies feel it’s no longer enough to monitor and secure the network perimeter as they have in the past. At the same time, new models for IT delivery have not only changed what needs to be secured, but also how.

[Read more…]