About Rocky Leong

This author has not yet written his bio.
Meanwhile let's just say that we are proud Rocky Leong contributed with 29 entries.

Entries by Rocky Leong

Mobile device management and unified endpoint management

Mobile device management and unified endpoint management

Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management tools, one of the more difficult areas of cybersecurity is one of the most difficult areas of cybersecurity. The everchanging and growing threat landscape makes security difficult enough, while the lack of control surrounding mobile devices poses an additional challenge for security teams and administrators.

Mobile devices come in various shapes in sizes with equally varying operating systems, further complicating administrator management. For example, most OS allow for remote control capabilities, while Apple only permits remote view.

The most effective way […] Read more

How Enterprise Mobility Management(EMM) Helps Organisations in Data Security?

How Enterprise Mobility Management(EMM) Helps Organisations in Data Security?

Right now, enterprise mobility is the direction every corporate is working on. We have seen tremendous growth in cloud computing nowadays. Bringing your own device is getting more satisfaction and convenience in day to day work in office culture. The use of devices and apps loaded in them is also getting too much task for IT team.

Artificial Intelligence, Internet of Things (IOT) and Augmented Reality are the center of the talks for every meetings and conferences in 2018. Gaining in popularity in 2017, Enterprise Mobility is the priority for most of the corporates in 2018. No doubt, Enterprise Mobility has […] Read more

Managed Google Play: Reimagining enterprise application management – Part 2

Managed Google Play: Reimagining enterprise application management – Part 2

Approved apps only

Managed Google Play provides Enterprises or IT admins with an option to restrict the Play Store content. All the Google Play Store content is available in the managed Google Play but a stripped-down version of the Play Store, that suits the work environment is made available to the end-user. This helps the user focus only on work while using the work profile.

All this seems great, right? What if I tell you there is something better, that there is a way to do more with your managed Play Store?
To use managed Google Play the organization needs to be enrolled […] Read more

How To Ensure Hybrid Cloud Security with Secure Endpoints – Part 2

How To Ensure Hybrid Cloud Security with Secure Endpoints – Part 2

Here are four key endpoint security principles that are important to follow to ensure a strong endpoint security footprint across a hybrid cloud environment. As continuation of Part 2, here are the remaining 2 part.

1. Keep software and operating systems up-to-date

Keeping software and operating systems (OS) up-to-date is crucial to securing your organizations assets, especially since a considerable amount of cyberattacks happen due to outdated systems. Take, for example, the Baltimore ransomware attack and the Equifax data breach, which were both connected to an issue of software not being properly updated and patched.

To save time and costs, incorporate automation so […] Read more

How to Ensure Hybrid Cloud Security with Secure Endpoints – Part 1

How to Ensure Hybrid Cloud Security with Secure Endpoints – Part 1

For corporate IT departments and executives, the opportunity to deliver valuable digital services and data resources to internal business users and external customers has never been greater. Mobile devices, apps and high-speed connectivity have made it possible for widely distributed workers to gain easy access to information. Anywhere/anytime computing is a reality.

However, as businesses continue to transition to a hybrid cloud infrastructure, it’s critical for IT teams to evaluate their endpoint security strategies to make sure data is protected wherever it resides.

Here are four key endpoint security principles that are important to follow to ensure a strong endpoint security footprint […] Read more

4 Hands-Free Frontline Worker Technologies for the 2020s – Part 2

4 Hands-Free Frontline Worker Technologies for the 2020s – Part 2

Galvanic Skin Response Devices

Hands-free galvanic skin response devices allow workers to easily learn more about their own emotions and experiences via sweat monitoring, and to optionally have that information relayed to other staff. This way, if employees operating heavy machinery are in a severely agitated state, they can be encouraged to take care of themselves, rather than potentially endangering others.

Managers can utilize these devices for more than just monitoring. The Feel Emotion Sensor, for example, offers an enterprise program wherein each worker is encouraged to monitor and sustain their own mental health. This, in turn, can improve workers’ perception […] Read more

4 Hands-Free Frontline Worker Technologies for the 2020s – Part 1

4 Hands-Free Frontline Worker Technologies for the 2020s – Part 1

Frontline workers have a hard upper limit to the amount and pace of manual labor they can perform, given the occupational hazards inherent to warehouses, factories, and other frontline worker domains. If a worker’s job involves manually moving heavy objects, for example, demanding faster performance will eventually come at the unacceptable cost of compromising their safety.

Emerging frontline worker technologies have introduced a way to safely enhance worker productivity: allowing employees to perform an array of functions while their hands are full. This way, employees can work more efficiently, while still taking every precaution necessary to avoid injury.

Take a look at […] Read more

Reflections on Android Enterprise – Part 2

Reflections on Android Enterprise – Part 2

Managed Google Play Account?

Another key feature for companies within Android Enterprise is the use of Managed Google Play Accounts that allows each enrolled device to automatically get a distributed Google Play account that’s managed by SOTI MobiControl seamlessly. No longer is there a need or hassle to create lots of gmail accounts. With this feature, companies can leverage the full potential of the Google Play store by silently pushing any app to the users’ devices and be protected by Google Play Protect.

In the recent releases of Android, Google has focused on the enterprise to make sure all the use cases, […] Read more

Reflections on Android Enterprise – Part 1

Reflections on Android Enterprise – Part 1

On November 14, the team and Stefan entered the Google office in Stockholm, Sweden, to run an event focused on what Android means for the enterprise. Working with mobility for the last thirteen years, I’ve closely observed and experienced rapid changes in mobile technology.

In comes Google with Android, and “together” with Apple the touchscreen market is completely changed! Bye, bye pen/stylus and hello finger-friendly intuitive interface.

EMM solution with Android management capabilities.

Fast-forward a few years of consumer adoption and a more fast phased development. It’s 2014 and Stefan start to see the first real successful attempts to implement Android at companies […] Read more