Posts Tagged ‘BYOD’

Samsung KNOX commercially available in Singapore

Wednesday, February 12th, 2014

The secure Android platform for Enterprise customers is offered by all telecommunication carriers in Singapore, and offers a comprehensive enterprise mobility platform for work and play.

The Samsung KNOX is now commercially available in Singapore.

The Samsung KNOX is now commercially available in Singapore.

Key mobile operators and partners in Singapore that offer Samsung KNOX are SingTel, StarHub, M1, Qool Labs, M.Tech, Malifax and Trusted Source.

Samsung KNOX is available on Samsung GALAXY S4, GALAXY Note 3, GALAXY Note 10.1 2014 Edition (LTE version) devices, as well as the upcoming GALAXY NotePRO and TabPRO line of tablets.

The Samsung KNOX license and technical support options are now available via key mobile operators and partners in Singapore.

Samsung KNOX is an end-to-end Android security platform for companies that require a secure and robust mobility solution by striking a fine balance between enterprise control and employees’ personal data privacy.

An integrated security platform, KNOX provides security hardening from the hardware through to the operating system (OS) and application layer, making KNOX a strong security proposition.

What Samsung KNOX offers

  • Offers high level of integrated mobile device security from hardware to application and operating system layers.
  • Addresses security requirements for enterprise mobile applications and data protection without invading personal privacy.
  • Provides better control and ease of manageability for IT departments to implement secure Bring Your Own Device (BYOD) strategies.


Trend Micro unveils Smart Protection Strategy for enterprises

Tuesday, April 9th, 2013

With the rise of targeted attacks, Trend Micro urges enterprises to redefine their security strategy to focus on the three C’s: Custom Defense, Complete End User Protection and Cloud Security.

Trend Micro celebrates 25 years this year, since its founding in 1988.

Trend Micro celebrates 25 years this year, since its founding in 1988.

With perimeter defense and conventional security becoming less effective against advanced targeted attacks, Trend Micro today announced the launch of Smart Protection Strategy to help enterprises redefine their security strategy in the wake of more sophisticated, stealthy and persistent cyber threats.

Eva Chen – CEO and Co-Founder, Trend Micro – described in detail the company’s Smart Protection Strategy at the annual Trend Micro APAC Media Summit 2013 in Singapore today.

JD Sherry – Global Director of Technology and Solutions, Trend Micro – then shared his perspective on the rapidly changing threat landscape, proposing how he believes cyber defence could be carried out in the new cloud era.

The three tenets of Trend Micro’s Smart Protection Strategy are extracted from the company’s press release and appended below. The full press release may be viewed/downloaded here.


IT Trends: Security in a time of convergence

Thursday, January 10th, 2013

Going into 2013, it’s a good time to look ahead at what enterprises should look out for in terms of working securely this year.

Let’s hear from Sugiarto Koh – Regional Director, ASEAN & North Asia, Sourcefire.

Sugiarto Koh, Regional Director, ASEAN & North Asia, Sourcefire

Sugiarto Koh, Regional Director, ASEAN & North Asia, Sourcefire

Sugiarto Koh opines that advanced malware and targeted attacks pose the greatest challenge for today’s security infrastructure and methods of protection.

Customers are struggling to find solutions that provide effective protection against the latest threats without over-burdening their budgets or sacrificing operational efficiency.

Below are Koh’s take on three major Enterprise IT trends and their implications.


IT Trends: Dell shares its technology outlook for 2013

Monday, January 7th, 2013

What are Dell’s foci for 2013. Transforming, Connecting, Informing and Protecting – says Ng Tian Beng, Managing Director, Dell South Asia & Korea.

Ng Tian Beng, Managing Director, Dell South Asia & Korea

Ng Tian Beng, Managing Director, Dell South Asia & Korea

Based on feedback from his customers, Tian Beng highlights two common issues that keep  them awake at night.

  1. Firstly, businesses are spending too much of their IT budget on powering their datacenter and not powering their business.
  2. Secondly, customers want solutions that are help them innovate rather than merely keep the lights on.

Ng anticipates that, in 2013, the technology priorities of Dell’s customers along 4 key themes – Transform, Connect, Inform and Protect.

Below are the details of the four themes.


Dell offers end-users power to do more

Wednesday, July 4th, 2012

Dell tackles current trends of workforce mobility and consumerisation of IT by offering a complete end-to-end ecosystem of end-point devices, solutions and services – to bestow maximum productivity to end-users in our fast-paced environment.

Chue Chee Wei, Marketing Director, South Asia and Korea Marketing for Dell.

Chue Chee Wei, Marketing Director, South Asia and Korea Marketing for Dell.

I was invited by Dell to listen to how the computer maker envisages the technology landscape and how it plans to cater to different end-users with very different needs.

Slide 1: Changing technology landscape and end-user profile.

Slide 1: Changing technology landscape and end-user profile.

Chue Chee Wei, Marketing Director, South Asia and Korea Marketing for Dell, gave a quick rundown of how the technology landscape and user profile are trending (see Slide 1).

Slide 2: Transformation of computing

Slide 2: Transformation of computing.

As a result of the changing landscape, work computing is undergoing transformation from the traditional highly-controlled and rigid framework – to one in which employees are given much more flexibility in terms of the devices they can use, the level of access, and the ability to access corporate IT anytime, anywhere (see Slide 2).

The organisational challenges to change and adapt current entrenched enterprise IT frameworks and practices are giving many a CIOs sleepless nights, worrying about potential security compromises on the road to recent phenomenons such as BYOD (Bring Your Own Devices).

Organisational challenges facing the CIO.

Slide 3: Organisational challenges facing the CIO.

Chue sees two main tracks in tackling these organisational challenges – managing technology and managing people (see Slide 3).

Chue’s vision for Dell end-user computing

“End-user computing is about delivering open, capable and affordable solutions for an evolving workforce,” says Chue Chee Wei, Marketing Director, South Asia and Korea Marketing for Dell.

To help enterprises and end-uses surmount these challenges, Dell is also placing much emphasis in enabling this transformation.

The company has taken on a customer-inspired design approach across a complete portfolio of systems, services and solutions.

It strives to ensure a seamless experience across multiple devices, operating systems and applications.

And it aims to provide tailored solutions optimised for management, security and productivity.

Simplify technology & people management, improve productivity.

Slide 4: Simplify technology & people management, improve productivity.

As a result, technology and people management are simplified while productivity is improved (see Slide 4).

Chue emphasised that Dell does a lot more than making computers.

Dell’s solution continuum.

Slide 5: Dell’s solution continuum.

It delivers a solution continuum that spans desktop virtualisation, mobility & collaboration, management, security and cloud, service and support (see Slide 5).

Some of these are provided by companies that were – leaders in their areas of expertise – that Dell has acquired over the years.

Dell’s updated line-up.

Slide 6: Dell’s updated line-up.

Dell’s updated computing line-up

Dell also set up and briefed on its updated line-up of computers (see Slide 6). These comprises a whole range of notebooks and desktops that cater to the computing needs of different end-users.

Of note is that Dell is positioning its high-end XPS ultrabooks – which has traditionally been targeted towards consumers – to attract corporate users looking to use their personal high-spec’ed notebooks for work as well.

This is indeed a shrewd cross-over move by Dell to exploit the BYOD phenomenon.

(Slides provided by Dell. Click to enlarge.)

SolarWinds Mobile Admin lets IT staff BYOD

Monday, April 16th, 2012

If you can’t beat them, join them! After years of fighting the tide of consumerisation of corporate IT, IT staff can now cross over to the “Dark Side” and  – bring THEIR own device to work.

Pricing for SolarWinds Mobile Admin software starts at US$695 per license and includes the first year of maintenance. Download the free 30-day evaluation trial online to try it out.

SolarWinds Mobile Admin Version 7

SolarWinds Mobile Admin Version 7

With the consumerisation of IT, employees and (more significantly) CXOs are banging down the doors of the IT departments to be allowed to bring their choice of personal devices to work and to access the Enterprise IT systems with these gadgets.

IT staff can now "Bring Your Own Device" too!

IT staff can now "Bring Your Own Device" too!

A strict No-No in the past, mane enterprises and organisations have given in to the pressure and allowed BYOD (Bring Your Own Devices) into their IT policies.

Now, the IT personnel too can jump on the bandwagon too.

SolarWinds, a provider of IT management software, has acquired Rove and released version 7 of the latter’s Mobile Admin software.

SolarWinds Mobile Admin software is designed specifically for mobile devices, with native applications for the most common mobile operating systems, and an extensive list of remote fix capabilities.

Now IT staff can also work with any device, from anywhere, anytime of the day (or night).

Mobile Admin works on iOS, Android and BlackBerry mobile devices.

Mobile Admin works on iOS, Android and BlackBerry mobile devices.

From the queues of a grocery store, or at the cafe with friends, an IT staff can manage a server on the other side of the world – resetting passwords and rebooting servers.

Mobile Admin is used by thousands of customers to monitor and manage their corporate IT infrastructure from their iPhone, iPad, Android smartphones and tablets, BlackBerry smartphones and PlayBook (OS2), and Kindle Fire.

In addition to dozens of third party systems and services, the latest version of Mobile Admin now adds support for Amazon EC2, Microsoft Active Sync, and SolarWinds network and server management products.

Some of the main features of SolarWinds Mobile Admin 7.0 are listed below.