Mobile management vendors compared

Enterprise mobility management (EMM) helps companies secure their mobile infrastructure, as well as control device policies and manage mobile apps, content, networks and services. The platforms have been around for a while; some might know them as mobile device management (MDM) suites. But those suites have matured and adopted new features.Editor's note: This chart was originally posted in May 2013 and was updated in March 2015 and again on June 27, 2016. We chose the vendors and products listed here based on conversations with independent analysts about which have significant market share or are important to include for other reasons such as features and functions. All information in the chart about the products and services comes from the respective vendors.To read this article in full or to leave a comment, please click here(Insider Story)

Don’t let stress and a crazy pace kill your culture

Tech companies have a reputation of being high pressure and fast-paced -- especially startups. That culture can quickly erode morale as employees begin to feel the strain of the long hours and rapid, and sometimes confusing, change.A 2015 study from VitalSmarts, a leadership training company, interviewed 827 tech employees, to look at how culture affects performance in tech companies. The study identified some key ideas around culture and how it can positively or negatively affect the overall performance of the company.David Maxfield, New York Times bestselling author and vice president of research at VitalSmarts, has been conducting social science research around Fortune 500 companies for the past 30 years. Based on his research, he offer these suggestions on what needs to change in the tech world, and how to change it. But if you think improving work-place culture in tech is about building a cutting edge office or offering the best benefits, you're probably wrong.To read this article in full or to leave a comment, please click here

Report: Security teams plagued by poorly managed identity data

Security teams handling Identity and access management (IAM) are hampered by dirty data and need management help from a chief data officer, according to a new report by TechVision Research.IAM is typically defined as a “security discipline that enables the right individuals to access the right resources at the right times for the right reasons.” But identity data is riddled with errors, which ultimately raise security and privacy risks, the report says.The problems include multiple versions of employee names and titles in various systems — and even “ghost” employees. “We find a plethora of identity data challenges, including multiple authoritative sources of data, inconsistent data, redundant data, old data and misclassification of data,” the report says.To read this article in full or to leave a comment, please click here(Insider Story)

Boost your security: Get IT and HR to collaborate

Ask what department is responsible for data security in an organization and the most likely answer is, “IT.” But some experts are saying it shouldn’t be IT alone – that better security requires a closer collaboration with Human Resources (HR).One example, they say, is a breach this past Feb. 26 at the Federal Deposit Insurance Corporation (FDIC), when a departing employee inadvertently downloaded 44,000 customer records, including personally identifiable information (PII), to a USB thumb drive.To read this article in full or to leave a comment, please click here

Boost your security: Get IT and HR to collaborate

Ask what department is responsible for data security in an organization and the most likely answer is, “IT.” But some experts are saying it shouldn’t be IT alone – that better security requires a closer collaboration with Human Resources (HR).One example, they say, is a breach this past Feb. 26 at the Federal Deposit Insurance Corporation (FDIC), when a departing employee inadvertently downloaded 44,000 customer records, including personally identifiable information (PII), to a USB thumb drive.To read this article in full or to leave a comment, please click here

ZeroStack offers a private ‘cloud in a box’

If you’re in my age bracket, you might remember this clip of Yosemite Sam yelling at his camel to slow down. He kept yelling, “Whoa, Camel,” but the headstrong camel wouldn’t stop until Yosemite Sam jumped off and hit him on the head. (For you millennials, it used to be OK for kids to watch this stuff.)A similar trend is happening in IT today. The cloud, specifically public cloud has become all the rage. We’re moving everything to the cloud—storage, apps, compute cycles, communications tools. You name it, there’s a cloud service for it. But are we moving too fast? Should CIOs be yelling, “Whoa cloud, whoa!” And then hitting their IT architects in the head with something?To read this article in full or to leave a comment, please click here

IRS kills electronic filing PIN feature due to repeated attacks

After repeated attacks, the U.S. Internal Revenue Service has decided to retire a Web-based tool for obtaining PINs that taxpayers could use to file tax returns electronically.The Electronic Filing (E-file) PINs Web application is no longer available on the IRS website "because of questionable activity," the agency announced last week.In February, the IRS disclosed that hackers used stolen taxpayer information like names, Social Security numbers, dates of birth and full addresses in order to obtain E-file PINs through its website.To read this article in full or to leave a comment, please click here

IRS kills electronic filing PIN feature due to repeated attacks

After repeated attacks, the U.S. Internal Revenue Service has decided to retire a Web-based tool for obtaining PINs that taxpayers could use to file tax returns electronically. The Electronic Filing (E-file) PINs Web application is no longer available on the IRS website "because of questionable activity," the agency announced last week. In February, the IRS disclosed that hackers used stolen taxpayer information like names, Social Security numbers, dates of birth and full addresses in order to obtain E-file PINs through its website.To read this article in full or to leave a comment, please click here

New products of the week 6.27.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.eSentire Training DayKey features: The security awareness training solution combines microlearning and gamification to arm your employees against the latest social engineering, spear phishing attacks, and more. More info.To read this article in full or to leave a comment, please click here

New products of the week 6.27.16

New products of the weekOur roundup of intriguing new products. Read how to submit an entry to Network World's products of the week slideshow.eSentire Training DayKey features: The security awareness training solution combines microlearning and gamification to arm your employees against the latest social engineering, spear phishing attacks, and more. More info.To read this article in full or to leave a comment, please click here

Intel is said to mull selling its security business

Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here

Intel is said to mull selling its security business

Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here

Intel is said to mull sale of its security business

Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here

Intel is said to mull sale of its security business

Intel is considering selling its security business as the company tries to focus on delivering chips for cloud computing and connected devices, according to a news report.The Intel Security business came largely from the company's acquisition for US$7.7 billion of security software company McAfee. Intel announced plans to bake some of the security technology into its chips to ensure higher security for its customers.With the surge in cyberthreats, providing protection to the variety of Internet-connected devices, such as PCs, mobile devices, medical gear and cars, requires a fundamentally new approach involving software, hardware and services, the company said in February 2011, when announcing the completion of the McAfee acquisition.To read this article in full or to leave a comment, please click here

Crafting responsive email with CoffeeCup’s RED

If you’ve ever sent bulk email such as newsletters, updates, sales pitches, etc., then you’ll be aware that this isn’t as simple as it used to be. Many moons ago, you could slap some text into a page along with a few links and that was good enough. Then came HTML mail and the ante was upped but you still didn’t have to break a sweat to ensure that the user could read your content. But now …To be competitive these days you have to deliver slick, styled, typographically sophisticated content with color, responsiveness, animation … you name it. And you’ve got to take into account not only how email renders on desktop clients (just consider the horrors of Microsoft Outlook’s eccentric rendering of otherwise valid HTML and CSS content) but also what happens to content in various Webmail services and, most importantly these days, on mobile devices. And just to make it all that little bit harder, many mobile platforms have specific version-dependent quirks that break the best-laid plans o' mice and designers.To read this article in full or to leave a comment, please click here