article thumbnail

The HP-Autonomy lawsuit: Timeline of an M&A disaster

CIO Business Intelligence

In fact, the HP acquisition of Autonomy probably ranks among the most notorious failed mergers and acquisitions. No sooner had the acquisition closed than revenue began to flag, prompting an internal investigation in which HP uncovered signs of past creative accounting at Autonomy. August 2011: HP agrees to acquire Autonomy for $42.11

HP 105
article thumbnail

5 tips for securing your remote workspace

CIO Business Intelligence

Security professionals must adapt controls to a world where the perimeter is distributed, and users can log into corporate resources from any network and any device. There are a range of tools that security teams can use to protect users and devices. The overriding obligation remains with IT to ensure the security of users.

Security 105
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Endpoint security and the rise of Managed Device Services

CIO Business Intelligence

But as the security threat landscape becomes more complicated, and hybrid and remote working models take root at scale, IT leaders are questioning this traditional approach to device management. Security is a key driver. In this environment, endpoint security becomes increasingly important.

article thumbnail

Digital security for the world of anywhere work

CIO Business Intelligence

Anywhere work comes with all-around security risks. When HP moved its workforce of 70,000 employees and contractors to a hybrid model, the umbrella of devices it had to protect expanded exponentially. Automated security policies HP Adaptive Endpoint Management helps automate security updates from the cloud.

HP 52
article thumbnail

Maximise productivity for employees and IT staff in the hybrid work era

CIO Business Intelligence

IT professionals now need capabilities that allow them to remotely support and secure user devices, as well as solutions that maximise their own productivity. All of this means that organisations require a tech strategy that provides tools to ensure all employees can get their work done effectively and securely — from anywhere.

HP 105
article thumbnail

Why traditional malware detection can't stop the latest security threats

Tech Republic Security

Isolating your hardware and your applications is a more effective way to prevent malware from infecting your critical endpoints, says HP.

Malware 207
article thumbnail

Bring your most productive self to work

CIO Business Intelligence

The key consideration for powerful performance is how the hardware is engineered. HP ZBook laptops are built to support the heaviest workloads, including 3D design, animation and data visualization solutions. HP Elite laptops are ideal for mobile executives who are delivering graphic-intensive presentations at customer locations.

HP 98