<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=666256816856398&amp;ev=PageView&amp;noscript=1">

Security Critical for Enterprise Mobility Market

Successful organizations understand the importance of leveraging different learning technologies to meet the growing demands of today’s tech-savvy workforce by providing instant access to information at the moment of need. The prevalence of smartphones and tablets has become an intrinsic part of our daily life, in terms of how we consume and process information. With the influx of millennials in the global marketplace learning at the speed of search, it is time, not only to provide just-in-time learning experiences, but also to create effective BYOD policies that promote efficiency, adaptability and security.

By Shina Neo • November 7, 2016

Gone Phishing: Enterprise Targeted Cybersecurity Training

Successful organizations understand that training content is intellectual property and it is critical to design and implement a strategy that secures it. Whether that’s establishing a data loss prevention strategy that identifies, tracks and prevents unauthorized access to confidential data or creating a BYOD policy, there needs to be an efficient and effective cybersecurity training program that’s relevant and retainable.  

By Shina Neo • October 12, 2016

BYOD : Are Your Employees As Safe As They Assume They Are?

Seventy percent of employees who have a smartphone or tablet use the device to check work email and perform other work-related tasks, a new Ovum study reports. The study, which was released in June of 2013, found that the numbers fly in the face of anti-BYOD (Bring Your Own Device) policies. Almost 30 percent of those using their phones for work-related tasks are violating an existing corporate BYOD policy. Even if you have an anti-BYOD policy in effect, your business could still be at risk.

By Joe Moriarty • November 14, 2013

The Technology Behind BYOD

What does BYOD mean to your organization? That's a question that INC.com posed to several leaders in the BYOD/BYOA space - including our own Joe Moriarty, vice president of marketing for Content Raven.

By Christy Laubach • September 16, 2013

The Rise of the Enterprise App

When online shopping first became a reality, there was a sudden and imperative need for software that would improve and provide security for online retailers and their customers. Enterprise applications are the natural progression of the evolution of this kind of software. 

By Joe Moriarty • May 28, 2013

4 Things You Need to Consider About Your Workplace's BYOD Policy

“Bring Your Own Device” (BYOD) is a practice that is increasingly becoming the norm in many offices. But just like any major change in the workplace, it helps to go consider important points about these changes, and set clear boundaries early in the process.

By Joe Moriarty • February 13, 2013

The Best Reading on BYOD

The Bring Your Own Device movement is no longer a small consideration - it’s something your business needs to address. Fortunately, there is a lot of expertise being generated about the best way to deploy and manage BYOD in enterprises. From data ownership considerations to an industry survey, here’s the best reading this month on BYOD. 

By Joe Moriarty • January 3, 2013

Secure Document Sharing – Managing Documents with Mobile Devices

Not surprisingly, mobile data consumption has exploded in the last few years and has become an essential way of conducting business. According to a recent study from CTIA, American mobile users have consumed 1.1 trillion megabytes between July 2011 and June 2012. That’s a huge increase of 104 percent over last year’s 568 million megabytes. 

By Joe Moriarty • November 1, 2012

Mobile Data Security : How Usage and Technology are Defining IT Policies

Mobile devices are an essential mainstay for most major enterprises, and even mid-sized businesses. However, mobile devices aren’t always secure. They can be hacked, stolen or otherwise compromised – along with the data they contain. Smartphones and tablets can be the gateway to major data breaches, which can put an organization at risk for regulatory fines, damaged reputation, loss of revenue and more.

By Joe Moriarty • October 4, 2012

Content Security: 3 Mobile Devices That May Put Your Content in Harm’s Way

Secure content delivery helps protect the information that is the cornerstone of all thriving businesses. It has never been easier to track, send, and receive information – especially when it’s sensitive and proprietary. Without the right content controls in place, all information that you use online or with your mobile device can be at risk.

By Joe Moriarty • September 13, 2012

3 Ways to Manage the BYOD Needs of Your Company

Like it or not, the BYOD movement is shaping up to be a permanent part of enterprise level IT. Several key pieces of research in the past few months point to the trend becoming a mainstay of the way employees use technology within your organization.

By Joe Moriarty • August 28, 2012
Report: What You Need to Know About BYOD


see all

Search Post