Mobile Device Managment and joined up thinking

Mobile Email Management responds to surge in world useage
Recent research estimates that there are 3.9 billion email accounts in use and this is expected to rise to 4.9 billion in 2014. 76% of these are for consumers, but the largest proportion of email traffic is business communications. 100 billion business emails were sent and received in 2013 each day. The increase in the mobile workforce is powerfully fed by retailers providing ready access to email through their range of devices, making this a clear contributor to the figures. Forrester assesses that by 2017, 78% of US email users will access emails through mobile devices. Employee freedom and flexibility is a must for profitability and business fluency. It is equally compelling that IT Directors and CISOs must engage with an MDM solution provider if organisations want data secured and properly protected (Airwatch, MobileIron and Citrix all feature in Gartner’s 2013 magic quadrant). Add to the rapid adoption of public cloud services, the arguments in favour of proactive management are overwhelming.

Are companies rethinking BYOD?
Interesting figures released for 2013 reveal that 73 million smartphones were purchased for business users in Q3 2013, a 34% increase in corporate purchasing over the same period in 2012. It begs the question whether Bring Your Own Device (BYOD) strategies are being re-thought by companies, let alone whether it is the right approach for business, or fair on employees. The fate of Blackberry could have distorted the figures as businesses sought to replace stock with new Apple and Android phones. However the challenges of adopting BYOD are maturing and in Gartner’s view, are 5-10% more expensive than the corporate option. Food for thought for CIOs.

HP seeks to bite greater market share through joined up technology
HP’s Discover event in Barcelona this week announced the arrival of their new workload optimised Converged System. A new engineered solution, it consolidates servers, storage, networking, software and services, through a single management tool and single point of accountability. With high performance virtualisation, faster data analytics of big data and a new hosted desktop experience based on the Moonshot server, they are hoping it will attract serious enterprise interest. If they deliver the promised increases in efficiency, speed, and always-on engineering HP will gain traction, which will become increasingly compelling, added to an order to operations timeframe of as little as 20 days.

Introducing the Cloud OS Network
In a move looking to strengthen their Cloud proposition, Microsoft has announced the Cloud OS Network. Made up of over 25 leading cloud service providers, the list includes business names such as Capita IT Services, Lenovo, Fujitsu Ltd and T-Systems. The providers operate in more than 90 markets, over 425 datacentres and serve over 3 million customers daily. This enables Microsoft to offer tailored infrastructure and application services from their new partners, whilst attracting new users to an all-powerful Azure cloud. Flexibility is the key here and Microsoft in opening up their Cloud proposition this way, could prove very compelling for businesses and enterprise.

Top Security Threats of 2013
As the end of the year approaches, it is time to look back over the top security threats that attacked in 2013. Distributed Denial of Service (DDoS) is still very fresh in our mind, after big attacks in recent weeks on RBS. DDoS attacks have been on the rise, taking advantage of greater available bandwidth. Mobile Applications threats have also been on the increase. With even more users downloading mobile apps, and the app stores themselves individually gaining more traction, larger numbers of people have fallen victim to data harvesting apps. Finally, with the focus on securing external attacks, ones from the inside are also on the increase. The average cost of internal breaches are also greater than external threats. With all this in mind the start of 2014 is certainly going to be an opportune time to review and implement security policy and defences.