Bring Your Own Device and Email Security
16 AugustBorderLAN announces availability of mobile applications and solutions for bring your own device (BYOD) challenged organizations. The announcement focuses primarily on securing email on mobile devices. BorderLAN Inc., a provider of network security solutions, announced today the availability of a new mobile app for businesses allowing easy access to secure email. With a simple per →
COMPLACENCY – A New Dangerous AV trend
16 AugustBorderLAN finds most AV (Anti-Virus) solutions lacking in their “what’s behind the curtain” report. Most AV technologies use old signatures and variants making a green-field opportunity for hackers and malicious software. BorderLAN Inc., a provider of network security solutions, announced today the release of their “what’s behind the AV curtain” report, which finds the majority →
The National Banks of Central Texas honor their promise
8 JulyA Tradition of Security For more than a century, The National Banks of Central Texas have been helping customers build their financial security. Now they’re helping protect their sensitive financial and personal data online as well.“We are very aware of our customers’ privacy and were determined it wouldn’t be breached, especially in this day and →
The Challenge of Device Diversity with BYOD
20 JuneAny challenge in supporting the increasing diversity of devices involved with BYOD? Anytime you open the door for outside devices you have to ask yourself “what is technology’s role in your tech plan?” With a NAC solution you have the ability to detect what kind of device is trying to connect to your network; with →
How to sell BYOD to Decision Makers
13 JuneLet’s face it: IT managers are not salesmen and often can be completely misunderstood with “geek speak”. With terms like BYOD, SNMP, NAC, MDM and even PC can become confusing to the non-initiated. The key is to sell the sizzle not the steak. In other words what decision makers want to hear is not BYOD →
Hurdles that go with BYOD
6 JuneFor years IT managers have been worried about people bringing their own technology into the classroom – what kind of viruses are they bringing onto the network? How many hours will be lost from support tickets from technology that’s not even owned by the school? But as time progresses so did the realization that the →