Mobile

Mobile
Confidential File Transfers Over Mobile DevicesConfidential File Transfers Over Mobile Devices

How are your staff transferring secure files over mobile devices today? 100 IT leaders share how they’re keeping mobile transfers compliant and secure.

Does your organization have a bring-your-own-device (BYOD) policy?

Top Answer : We have it, but there is no reimbursement.  We had extremely low adoption, since CORP traffic would eat up a significant amount of your monthly data plan. I personally did not choose to use my personal phone for work.

289 views
1 comments
0 upvotes
Related Tags
How are people approaching a mobile-first workforce in their organization?

Top Answer : One word - ZeroTrust. DM me if you want more details.

4788 views
2 comments
8 upvotes
Related Tags
What are your thoughts on SaaS management platforms (SMP)?

Top Answer :

11 views
0 comments
2 upvotes
Related Tags
Business Application Development
Architecture & Strategy
Maintenance
Requirements & Design
Testing, Deployment & QA
Mobile Development
Development
Selection & Implementation
Business Analysis
Applications Vendor Landscapes
Optimization
Backup
Data Center
Public and Hybrid Cloud
Telephony
Network
Compute
Storage
Business Applications
Cloud
Crisis Management
Data & Business Intelligence
Artificial Intelligence
Business Intelligence Strategy
Data Management
Enterprise Integration
Integrations
Machine Learning
Governance
Data Lake
Big Data
Data Warehouse
Disruptive & Emerging Technologies
5G
Blockchain
Cryptocurrencies
Virtual Reality
IoT
Reality
Digital Innovation
Bots
Augmented Reality
End-User Services & Collaboration
Collaboration solutions
End User Equipment
End-User Computing Devices
Endpoint management
Productivity tools
Document Management
End-User Computing Applications
End-User Computing Strategy
Mobile
Voice & Video Management
Continuous Integration
Technical Product Management
DevOps
Continuous Deployment
Development
Quality Assurance
Customer Relationship Management
Enterprise Content Management
Customer Success
Enterprise Information Management
Finance
Enterprise Resource Planning
HR
Legal
Marketing Solutions
Retail
Human Resource Systems
Marketing
Product Recommendation
Sales
Risk Management
GDPR
SOX Compliance
Governance, Risk & Compliance
Infrastructure & Operations
Cloud Strategy
I&O Finance & Budgeting
Operations Management
Network Management
DR and Business Continuity
Server Optimization
Leadership
Attract & Select
Cost & Budget Management
Engage
Culture
Manage Business Relationships
Innovation
Organizational Design
Program & Project Management
Train & Develop
Values
Talent management
Performance Measurement
Organization Structure
Manage & Coach
Availability Management
Financial and Vendor Management
Reporting
Service Desk
Management Tools
Enterprise Service Management
People & Process
Process Management
Asset Management
Project & Portfolio Management
Portfolio Management
Project Management Office
Pulse
Security
Confidentiality, Integrity, Availability
Secure Cloud & Network Architecture
Endpoint Security
Data Privacy
Identity and Access Management
Security Operations Center
Security Strategy & Budgeting
Security Vendor Landscapes
Threat Intelligence & Incident Response
Threat & Vulnerability Management
Vendor Management
Infrastructure Vendor Landscapes
Budgeting
Roadmap
Outsourcing
Strategy & Operating Model
Business Continuity
Architecture Domains
Strategy
Tool Recommendation
Leveraging Mobile Across Departments - Non-TechnicalLeveraging Mobile Across Departments - Non-Technical

This report was generated to help non-technical teams benchmark their mobile practices against their peers.

Leveraging Mobile Across Departments - TechnicalLeveraging Mobile Across Departments - Technical

This report was generated to help technical teams benchmark their mobile practices against their peers.

When was the last time that you updated the Operating System on your computer, smartphone or some other device?

Top Answer : Asap. Mainly to improve security

42 views
14 comments
4 upvotes
Related Tags
Is it right for a company to expect you to use your personal phone number when you work from home?

Top Answer : Usually, companies that have a Bring your own device (BYOD) policy for mobile phones offset the cost of having the device through some form of stipend to the employee. This allows the individual to have the capability of having a single number for both personal and professional interactions. It also eliminates the need to juggle multiple phones. I think this will extend to a sheer WFH situation. Expecting an employee to use their personal phone without some form of stipend of support is taking the employee for granted IMHO.

If these companies were affected then the foundation of computing could be at risk. If you could manipulate at the hardware layer via the firmware, BIOS, ect then a threat actor could weaponize well below the operating system which brings in to question the integrity of the entire computing stack and everything above it.  The firmware and bios are like the rebar and concrete for a building. If that foundation is weak then the entire structure and anything dependent on it is at risk. We cannot underestimate the potential or the severity of these companies being potentially affected by the SolarWinds hack and what that means for the foundational computing hardware they provide to the world.  What do others think ?  How could this impact your organization ?   Big tech companies including Intel, Nvidia, and Cisco were all infected during the SolarWinds hack - The Verge

Top Answer :