Data Protection March 13, 2017 The Enterprise Mobility Conundrum: How to Control the Data? 3 min read - Businesses can benefit from BYOD policies, but IT leaders must implement the right enterprise mobility solutions to protect their sensitive data.
Intelligence & Analytics March 7, 2017 From Linear to Orbital: Rethinking Defense in Depth 3 min read - Defense in depth uses a layered approach to protecting networks and systems from breaches. It relies on multiple lines of defense to provide redundancy.
March 19, 2015 BlackBerry Launches Secure Tablet in Collaboration With IBM, Samsung 3 min read - BlackBerry launched a secure tablet for government and corporate use through a partnership with IBM and Samsung in what could be its chance for a comeback.