- Opponents restate security, scope concerns as metadata retention becomes Australian law
- The week in security: Now law in Australia, data retention challenged overseas
- GitHub recovering from massive DDoS attacks
- Eyes on China as massive DDoS on GitHub heads into day three
- 'Largest DDoS attack' in GitHub's history targets anticensorship projects
mobile workforce - News, Features, and Slideshows
Companies will need to invest heavily in unified communications (UC) over the next four years as more staff work from home or in remote locations, according to analyst firm IDC.
Aptly named, a company's help desk is primarily focused on resolving technology issues so the business as a whole can function successfully. Despite the best of intentions, however, help desks can put the company at risk by using legacy tools, shared passwords and incomplete security practices.
Supporting staff who want to bring their own devices and applications to work may be a pain for many CIOs, but the business benefits make implementing a program worth the time and effort, according to Dimension Data's CIO Ian Jansen.
According to recent reports, the average business traveler carries three mobile devices for work and 25% of IT decision makers believe desk phones will be replaced by mobile phones within two years. The data points to an increasingly mobile workforce, one that expects a single user experience for accessing unified communications (UC) applications and services across all their preferred devices -- whether it is an employer-issued smartphone or an employee's BYOD tablet device.
Whitepapers about mobile workforce
This whitepaper looks at how you can empower people to use windows applications and native mobile apps on any type of device while meeting your full security needs. •Find out the challenges of reaching a balance between successful app usage and security •Learn the approach to efficiently mobilising the Windows applications your organisation depends on •How an integrated solution can help people become as productive as possible, while maintaining security