Current Analysis analyst Brad Shimmin says that Google's new Android for Work platform shows that Google is really getting into the bring your own device mindset. Shimmin says that the platform is enterprise-friendly because it focuses on enterprise mobility management, original equipment manufacturers (OEM) and independent software vendors. At its most important function, Android for Work puts company data into a secure profile and separates it from regular, and insecure, personal user data. Software vendors won't have to create two separate apps because both profiles can now reside on a single application. The upshot? It's not whether employees use Apple iOS or Android, enterprise IT managers want a platform that is secure and easy to oversee.
Read more about why Google's Android for Work puts it ahead in the BYOD game.
Why organizing GRC software is like cleaning out a junk drawer
Gartner blogger and Research Director John Wheeler says that organizing your company's governance risk and compliance (GRC) software can seem like cleaning out a junk drawer. Most companies have a plethora of risk management applications and by the time they need to find the right one, it can be hard to sort through all of the software. Sure, all the applications were created with a specific purpose in mind, but if they aren't organized in some way, it can lead to overwhelming experiences. By using a pace-layered application approach, it is possible to split your GRC software into three categories: systems of record, systems of differentiation and systems of innovation. Bottom line? Risk management is improved, Wheeler says.
Read more of how Wheeler says you can discover what's in your GRC junk drawer.
User activity monitoring does not have to be an invasion of privacy
Enterprise Management Associates blogger David Monahan says that the time and place for user activity monitoring (UAM) has arrived. Even though some people might see it as an invasion of privacy and fear that big brother is constantly peaking over their shoulders, UAM can prevent network attacks, identity theft and also serve as an auditing and compliance tool.
"Identifying threats to employees and organizational information is key to maintaining confidentiality, integrity and availability," Monahan says.
As long as companies employ data protection measures to ensure that UAM does not cross the line between protective and invasive, Monahan says the approach should be used in every company.
Read more about why Monahan says UAM is a necessary strategy for companies.
Frost and Sullivan research finds Android to be the most common mobile operating system supported in organizations.
Harvey Koeppel discusses the GRC maturity model and explains how CIOs can turn risk management into business value.
What assets should take priority for protection, monitoring and security?