COVID-19: Business Continuity Outside the Workplace
COVID-19, referred to the Novel Coronavirus, is globally affected over 100,000 people direcly and millions indirectly. For years we’ve heard in Information Security that “the perimeter is dead,” but now is the time that we test it as some companies
COVID-19: Managing Cyber Security Risks of Remote Work
As cases of the Novel Coronavirus (COVID-19) are increasing over the country, most of the companies are changing their workforce to home-working to curb the virus spread. Teleworking, “remote working,” or simply “working from home,” is a centerpiece of those
5 Ways MDM Solutions Help in Work from Home
As of March 19, tens of thousands of companies worldwide are making major changes to reduce the risk of employees contracting COVID-19, by allowing remote working from home. Working from home is a hard adjustment for anyone to make, especially for
COVID-19: Work from Home May Increase Cyber Threats
As the Prime Minister Muhyiddin Yassin has ordered a partial lockdown of all public activities in the country from March 18 until March 31, it forced the closure of all government and private premises except essential services. Due to the
Improving Work Experience with a Digital Workspace
An employee’s work space has evolved a lot over time an there are increased of the employee's need for flexibility due to the idea of "sit down job". The digital work space should allow the employee to work from any
Cloud vs On-Premises MDM
Many companies have trouble choosing solutions for Mobile Device Management (MDM) between cloud-based or on-premises solution. While setting up the IT infrastructure for your business, you will be concerned with the simple inquiries “Should I pursue on-premises solutions or migrate
Key Security Functions of Unified Endpoint Management – Part 2
Enterprise mobility management: Securing data at rest, in transit, and in use Managing the security of mobile endpoint devices such as smartphones, laptops, and tablets is different from managing the security of the stationary computers. In the case of the former, more
Key Security Functions of Unified Endpoint Management – Part 1
As part of digital transformation, the adoption of a wide range of devices for work is on the rise. A unified endpoint management (UEM) solution is capable of enforcing management policies and configurations, as well as securing endpoints. Why is endpoint
Kiosks Solution for Restaurants – Part 1
Nowadays, more and more companies are regaining customer experience in various aspects and implementing the same at multiple touch points, they are utilizing many ways to make customer decision or purchase journey at ease. Kiosks are playing a vital role
Mobile device management and unified endpoint management
Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management tools, one of the more difficult areas of cybersecurity is one of the most difficult areas of cybersecurity. The