<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=666256816856398&amp;ev=PageView&amp;noscript=1">

Security Critical for Enterprise Mobility Market

Successful organizations understand the importance of leveraging different learning technologies to meet the growing demands of today’s tech-savvy workforce by providing instant access to information at the moment of need. The prevalence of smartphones and tablets has become an intrinsic part of our daily life, in terms of how we consume and process information. With the influx of millennials in the global marketplace learning at the speed of search, it is time, not only to provide just-in-time learning experiences, but also to create effective BYOD policies that promote efficiency, adaptability and security.

By Shina Neo • November 7, 2016

Gone Phishing: Enterprise Targeted Cybersecurity Training

Successful organizations understand that training content is intellectual property and it is critical to design and implement a strategy that secures it. Whether that’s establishing a data loss prevention strategy that identifies, tracks and prevents unauthorized access to confidential data or creating a BYOD policy, there needs to be an efficient and effective cybersecurity training program that’s relevant and retainable.  

By Shina Neo • October 12, 2016

BYOD : Are Your Employees As Safe As They Assume They Are?

Seventy percent of employees who have a smartphone or tablet use the device to check work email and perform other work-related tasks, a new Ovum study reports. The study, which was released in June of 2013, found that the numbers fly in the face of anti-BYOD (Bring Your Own Device) policies. Almost 30 percent of those using their phones for work-related tasks are violating an existing corporate BYOD policy. Even if you have an anti-BYOD policy in effect, your business could still be at risk.

By Joe Moriarty • November 14, 2013

The Technology Behind BYOD

What does BYOD mean to your organization? That's a question that INC.com posed to several leaders in the BYOD/BYOA space - including our own Joe Moriarty, vice president of marketing for Content Raven.

By Christy Laubach • September 16, 2013

The Rise of the Enterprise App

When online shopping first became a reality, there was a sudden and imperative need for software that would improve and provide security for online retailers and their customers. Enterprise applications are the natural progression of the evolution of this kind of software. 

By Joe Moriarty • May 28, 2013

4 Things You Need to Consider About Your Workplace's BYOD Policy

“Bring Your Own Device” (BYOD) is a practice that is increasingly becoming the norm in many offices. But just like any major change in the workplace, it helps to go consider important points about these changes, and set clear boundaries early in the process.

By Joe Moriarty • February 13, 2013

The Best Reading on BYOD

The Bring Your Own Device movement is no longer a small consideration - it’s something your business needs to address. Fortunately, there is a lot of expertise being generated about the best way to deploy and manage BYOD in enterprises. From data ownership considerations to an industry survey, here’s the best reading this month on BYOD. 

By Joe Moriarty • January 3, 2013

Secure Document Sharing – Managing Documents with Mobile Devices

Not surprisingly, mobile data consumption has exploded in the last few years and has become an essential way of conducting business. According to a recent study from CTIA, American mobile users have consumed 1.1 trillion megabytes between July 2011 and June 2012. That’s a huge increase of 104 percent over last year’s 568 million megabytes. 

By Joe Moriarty • November 1, 2012

Mobile Data Security : How Usage and Technology are Defining IT Policies

Mobile devices are an essential mainstay for most major enterprises, and even mid-sized businesses. However, mobile devices aren’t always secure. They can be hacked, stolen or otherwise compromised – along with the data they contain. Smartphones and tablets can be the gateway to major data breaches, which can put an organization at risk for regulatory fines, damaged reputation, loss of revenue and more.

By Joe Moriarty • October 4, 2012
Report: Preventing Revenue Loss with Content Security


see all

Search Post