Evaluating Endpoint Security: 4 Forgotten Factors [Trend Micro]

Catch the news and you get a pretty clear sense that times are tough and people are still hurting out there. Naturally, all of us respond by looking at our budgets, then cut what we feel are needless expenses. That’s all well and good – we can survive with one less vacation, or outfit hanging in our closet. But when we make short-term cost-cutting decisions – like nixing a gym membership – that affects our long-term health and hurts more in the long run.

That’s what’s happening with IT security budgets. In an effort to do more with less, IT and security managers are looking for ways to cut costs. It’s not surprising to find out that organizations, in evaluating new security systems, are focusing on initial acquisition, licensing and maintenance costs. Which means they’re tempted by low-priced options. But just like not going to the gym turns you into a couch potato, compromising on security for mail servers and endpoints is just short-term gain for long-term pain.

The true cost of any enterprise security solution depends on four additional factors beside upfront fixed cost investments, and these should be taken into serious consideration before choosing any new endpoint security solution.

[Read more…]

Security In A New Mobile World [Trend Micro]

In case you missed it, Smartphones and other mobile devices overtook traditional PCs in sales back in 2010. How did this happen?

There are a whole host of factors at play. Foremost among them has been consumerization, which gives consumers access to powerful computers and high-speed internet at home. Responding to increased expectations at work, employers began embracing Bring Your Own Device (BYOD) policies and allowing consumer mobile devices – like smartphones, tablets, non-PC laptops and netbooks – into the office. Employees, for their part, started using those devices to access their organization’s corporate networks and cloud service platforms, which helped them become more responsive and productive at home, on the road and in the office.

And everyone lived happily ever after. Well, not quite.

[Read more…]

For IT in Healthcare, An Ounce of Protection is Worth a Pound of Cure [Trend Micro]

No matter what business you’re in, keeping confidential information from ending up in the wrong hands is critical. When you’re in the business of saving lives and improving health, that’s especially true when it comes to patient records.

In fact, with regulatory mandates like the Health Insurance Portability and Accountability Act and HITECH Act, hospitals now face significant penalties if they don’t implement strong and flexible data protection across their networks. That doesn’t just mean data protection on PCs in the hospital. It also means protection of portable data on potentially thousands of mobile endpoints, including tablets, smartphones and USB devices. Even one incident of data leakage can be disastrous – to the patient, and to the healthcare institution’s reputation.

[Read more…]