How We Achieve Zero Touch BYOD
As a technical guy, I find it is often a bit difficult to understand what a company’s product actually does by reading the corporate website. Of course that’s not true with our website! But in the...
View Article13 Reasons Not to Use Armor5 (humor)
[ Our marketing guy wants me to explicitly tell you that this post is meant to be funny and there are not actually 13 real reasons not to use Armor5. Oh boy, disclaimers on humor! ] So here are 13...
View ArticleWhy We Founded Armor5
Armor5 was born out of a simple need: to provide secure access from any device. Employees enjoy the ability to access corporate assets from a device of their choice. IT security professionals enjoy the...
View ArticleUser Privacy & BYOD: Why MDM Doesn’t Cut It
In Tom Kaneshige’s article in CIO Magazine, BYOD Lawsuits Loom as Work Gets Personal, he discusses the legal implications of deploying Mobile Device Management (MDM) software to your employees’...
View ArticleBYOD Policy Enforcement Gets the Dilbert Treatment (video)
Has it come to this? BYOD has reached a tipping point in the enterprise, with 74% of companies reporting in a recent survey by Osterman Research that they will have a BYOD program and policy this year....
View ArticleSaaS Providers Can Increase MRR Solving the “Last Mile” Security Problem
Anyone in the telecom industry is very familiar with the “last mile” problem. Early use of the term in the 20th Century referred to the fact that it was easy to string telegraph or telephone poles from...
View ArticleCIOs Must Act on BYOD Threat
A whopping 86 percent of BYOD-ers say they access or save work-related information on their mobile device. Some 5 percent of users admitted losing a personal device used for work, either forgetting it...
View ArticleEnterprise with 1000 employees can save over $225,000 per year on enterprise...
In todays always on mobile work environment, you want your workforce to be productive. They should be able to access their applications and content whenever they need it, where ever they are without...
View ArticleKeeping Enterprise Mobile Apps Secure
Andrew Borg, in his article How To Keep Enterprise Mobile Apps Secure, correctly points out that mobile apps must be treated as essential parts of an enterprise security ecosystem that extends from the...
View ArticleAiming for Zero Gap – How to Enable Cloud and Mobile Data Access While...
A Blog Series by Guest Writer – Scott Wright, CISA: “The Streetwise Security Coach” Introduction to our Armor5 guest blogger: Scott Wright is a long-time security blogger, coach and consultant, and a...
View Article
More Pages to Explore .....