Last month, I sat down with my colleague, John McKnight, to give my predictions on how Data Protection will or should change in 2015 … in five minutes or less:
My top areas of interest for this year include:
Protecting SaaS applications, such as Office365, GoogleApps and SalesForce Protecting corporate data on endpoint devices […]
ESG recently started offering TechTruths … single nuggets of data and the analyst perspectives of why they matter. Check out all of them via the link above, but here is my favorite so far on BYOD data protection:
So, why doesn’t IT back up BYOD endpoints?! It isn’t a rhetorical question.
I have always […]
A few months ago, I wrote about how my Surface Pro (v1) had become the only device that I travel with (blog).
Since then, I have streamlined optimized even further, with a few other gadgets. In my travel bag:
Portable DVD/Blu-Ray from Buffalo ($85)
This ultra-portable Blu-Ray player/burner is barely larger than two blu-ray […]
BE AWARE that today’s laptop and mobile devices have one less recovery option than they used to.
This particular customer service announcement is targeted mostly at business executives and the IT professionals who support them.
- Those folks presume that device theft never happens and that they are too responsible to ever leave […]
This is an absolutely phenomenal device – with enough CPU to do my day job while I travel, long enough battery to last a day of meetings (or a long flight), and light enough that it is now the only gadget that I put in my bag (leaving home my power-laptop and eReader).
That all […]
Doing a selective mobile device backup that separates work data and personal data can’t be done, says analyst Jason Buffington, but perhaps not for the reasons you think.
Before I get started, let me define the two basic types of endpoint devices: consumption devices and creation devices.
Consumption devices are like e-readers that fetch data […]
One of the most complicated areas of data protection in IT today has to be around securing the data on endpoint devices (laptops & tablets). Frankly, most IT organizations weren’t able to do an effective job of protecting that data when the devices were corporate-owned, but with the myriad devices that are now in use, […]
A while back, I decided to do an experiment on BYOD — here are my results: JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s BYOD experiment – part 3, Corporate Expectations JBuff’s BYOD experiment – part 4, video excerpt from BYOD seminar JBuff’s BYOD […]
A while back, I decided to do an experiment on BYOD — here are my results:
JBuff’s BYOD experiment – part 1, Acquisition Challenges JBuff’s BYOD experiment – part 2, Getting Started with Data JBuff’s BYOD experiment – part 3, Corporate Expectations JBuff’s BYOD experiment – part 4, video excerpt from BYOD seminar JBuff’s BYOD […]
One of the more intersecting discussions in data protection is BYOD. When its not a corporately owned device, and therefore the IT department has far less influence (including perhaps the inability to install agent technologies on it) — who is responsible for backing up the data, and where should corporate data be backed up to […]