Remove Authentication Remove Big Data Remove Enterprise Remove Malware
article thumbnail

Identify yourself for MIM - A Screw's Loose

A Screw's Loose

Essentially he has built a Venn Diagram based around 3 concepts, Mobile Security, API Security, and Enterprise Security. We may disagree slightly about MAM since I think it ties into Enterprise Security as well but I think in his case it pertains to how he has set this diagram focused around security. Enterprise. Recent Posts.

article thumbnail

Barn Doors - A Screw's Loose

A Screw's Loose

They throw around words like secure containers, containerization (hmm…somebody went to marketing class and turned it into a verb), encryption, VPN, Secure Communication, EMM (Enterprise Mobile Management) and a whole host of other terms that of course make it okay to bring your device into work. These people all miss the point.

Mobile 60
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

The Cart before the Horse - A Screw's Loose

A Screw's Loose

Philippe Winthrop has asked the panel about developing apps in HTML 5 as a way to build for every device and using that as a strategy in the enterprise. They map out how to access the expense system to submit the expense, and how to give access to the data. They then map out how to authenticate the user. Enterprise.

Mobile 56
article thumbnail

Seven Trends and Predictions for 2017

CTOvision

Philips and Dutch Radbound University are using big data and IoT to get patients with chronic obstructive pulmonary disease (COPD) out into the world. Expect to see bare-metal cloud to displace hyper-visor based cloud for the enterprise. The big story of 2017 won’t be any single technology. Trend #5—Upset in Public Cloud.

Trends 150
article thumbnail

You want me to do what?!? A mobile strategy challenge!

A Screw's Loose

I recently gave a presentation at the Consumerization of IT in the Enterprise conference in San Francisco. I spent the whole presentation on Securing the Mobile Enterprise building up to the the fact that most businesses were approaching mobile strategy using legacy thinking and now was the time to get out of the habit.

Mobile 78