2015 Articles

Why solving the app gap is essential for enterprise mobility to prevail

It has taken a while, but the enterprise is finally starting to embrace mobility at scale, with 63% of organisations “believing that mobility provides a competitive advantage.”

The reasons for this evolution are threefold. For one, evidence now exists proving that employees with mobile access to critical workflows increase their productivity by 50%. Secondly, when productivity is enhanced, the opportunity to maximise cost savings – the primary motivation of most enterprise decision makers - rises exponentially. Thirdly, the consumerisation of IT is driving employees to demand greater workplace flexibility and 24/7 on-demand access.

Security SDK that allows Multiple User Access for Encrypted Files and ensuring a file maintains integrity when encrypted

Security SDK that allows Multiple User Access for Encrypted Files and ensuring a file maintains integrity when encrypted

We have implemented a system which will provide functionality to manage multiple users, split into multiple groups, across one or more deployments and easily manage their access to encrypted data throughout an organisation’s entire infrastructure of technology. The SDK is also quite unique in the way it provides group access to encrypted data – unlike anything else we have seen in the market to date.

Protecting the whole organisation

Part 3: Protecting the whole organisation

Find a way to decrypt a bit of protected information and the whole organisation is exposed. Well, only if all information is encrypted the same way with the same cryptographic key. The answer could be to just encrypt small blocks of data with different cryptographic keys, but this would involve management of an increasingly large set of cryptographic keys and just far too much overhead resulting in much too slow access to encrypted data.

The use of Encryption Algorithms

Part 2: The use of Encryption Algorithms

Knowledge of the algorithm used to convert (encrypt) the data is required in order to convert back (decrypt) the data into useful information. It turns out that only standard algorithms tend to be used to encrypt data, so a would-be hacker can perform multiple attempts of known algorithms to decrypt noisy data back to useful information.

Protect your data without a user revolt

Part 1: Protect your data without a user revolt

Another Data Breach due to stolen information stored on a corporate device has been reported and data protection gets its marching orders to the top priority of IT Policy. And how many data breaches are left unreported? The importance of the security and governance of corporate data has become a major consideration upon IT Policy Managers. Yes, sensitive data is always stored on corporate devices no matter what process is used to perform business activities. Data will always be left on the device in one form or another. This data must be protected for the confidence of performing productive operations out in the big open field.

Data breaches to cost businesses £1.3 trillion by 2019

New research suggests that the rapid digitisation of consumer's lives, combined with increasing cyber-crime activity, will push data breach losses up to US$ 2.1 trillion (£1.34 trillion) globally by 2019.

In its latest report ‘The Future of Cybercrime & Security: Financial & Corporate Threats & Mitigation', Juniper Research predicts that the majority of these breaches will still come from existing IT and network infrastructure, with the  number of mobile and Internet of Things attacks expected to be “minimal" in comparison to more traditional computing devices.