Using Mobile Devices in the Business Environment: How to Avoid Data Loss. Part 2 – There is Light at the End of the Tunnel

Part 1 – The Dark Side of BYOD

Responding to challenges is what IT experts always do. All the mentioned threats can be “treated” with smart IT security measures. Specific measures that allow us to significantly reduce the risk of using mobile devices for working purposes are as follows: Continue reading

Using Mobile Devices in the Business Environment: How to Avoid Data Loss. Part 1 – The Dark Side of BYOD

At the end of 2013, Gartner published the list of the top ten technologies and trends that will be strategic for most organizations in 2014. Gartner predicts that these trends will lead to the creation of a new economy driven by various types of cloud technologies; total mobilization, Internet, and web-scaled IT; and, most importantly, the smart machine era, the most disruptive in the history of IT. Continue reading

Case Study: Enterprise Information Protection Product

One of Auriga’s customers—a US-based vendor of software solutions that provide “complete protection” for intellectual property and other mission-critical data vital to operating the modern global enterprise—tasked our engineering team to port its flagship solution to Linux OS, several virtual frameworks, and mobile platforms to expand its presence on the global security applications market. To continue to stay ahead of its competitors, the customer’s existing engineering force needed to continue working at full speed on enhancing the existing Windows solution; thus, the project was to be executed with minimal management and engineering overhead. Continue reading

IT Outsourcing: Information Security is a Process, Not a Destination

In recent years, the IT outsourcing market has shown stable growth. According to Gartner, the size of the global IT outsourcing market will reach 252 billion U.S. dollars in 2012, which is 2.1% more than in 2011. Yet some companies still hesitate when deciding whether they should outsource a number of selected tasks to a third party. Mostly, this hesitation is tied to the risks that—according to some market participants—are an inherent part of the outsourcing industry. Continue reading