Author: Absolute

Endpoint Visibility Lacking for BYOD

If 72% of organizations are supporting BYOD for all or some of their employees, you would expect a similar figure for controlling data security on those devices? Sadly, this ideal still remains elusive. A new report suggests that while BYOD is nearing universal acceptance, basic precautions such as encryption, remote wipe or mobile application management, to name a few, remain elusive for many organizations. And yet, there are signs that the tide is turning and the percentage of organizations attempting to protect data on the endpoint are on the rise.

Read More

Control the Rise in Shadow IT Post-Christmas

Millions of new devices have been bought and activated over the holidays. We saw that 2015 Black Friday sales showed some of the highest increases in new device activations for the iPad mini and a number of smartphones, with Apple product activations topping those in 2014. With Christmas now behind us, we’ll see an even larger spike in new device activations for all the tablet, smartphone and laptops gifted this holiday season.

Read More

Predictions for Data on the Endpoint in 2016

We recently took a look back at our Predictions for Mobile in 2015, looking at how our predictions panned out for the year. Overall, we saw a marked shift toward understanding the complexities of how people and endpoint devices put data at risk. As a new year approaches, we expect that organizations will continue to face data security challenges with the endpoint as one of the greatest threats to corporate data.

Read More

Categories