This story is becoming frustratingly old. Cyber threats are continuously advancing in their adaptability speed, sophistication, and degree of stealthiness. At the same time, the exposed footprint is expanding. More business operations are moving online and end-user devices—corporate-issued and user-owned—are expanding in number and variety. A reasonable question asked by executives responsible for making decisions on their organisations’ security budgets is whether their money and resources are being spent wisely. Are their businesses buying and using the best mix of security technologies to meet their needs and obligations? Read on.
Like all law enforcement agencies, the Suffolk County Police Department needed to provide its field officers – intelligence officers in particular – with quick, seamless access to its central database through a VPN connection. For such officers, the ability to quickly obtain information on a suspect or developing situation can be the difference between a successful arrest and a failed one, or even between life and death. Therein lay the problem: in order to comply with strict IT security regulations, any device that connects to a police database must use two-factor authentication; a username and password simply aren’t enough. Download whitepaper »
Due to the sensitive nature of its work, the Australian National Audit Office (ANAO) needed to implement a mobile solution that met its strict security requirements and supported its blended BYOD / COPE policy, while driving enhanced collaboration and productivity through real-time communications amongst its workforce. Download whitepaper »