Computerworld - ... when it comes to major technology implementations," warns John Norcross, vice president of technology at Celerant Consulting Inc. in Lexington, Mass. The U.S. branch of Novell Inc.'s U.K.-based consultancy teamed with newsweekly The Economist to poll
executives at 290 mostly midsize U.S. and Canadian companies on their ability to handle big IT projects. Norcross says the survey results, which will be released this week, revealed that less than half of the respondents have attempted a major technology rollout during the past three years. He worries that the hiatus, combined with the "decimation" of IT departments through cutbacks and outsourcing, will hobble any IT-dependent "transformational change" initiatives demanded by top management as the economy improves. "I don't know whether it's a crisis, but it's approaching one," he contends. Although consultancies might benefit from the situation, Norcross says that without IT expertise inside companies, "all you've got is a bunch of generic consultants with generic knowledge producing a generic solution."
Wireless defenses reinforced with ...
... the release this month of rival offerings AirDefense 6.0 and PredatorWatch Auditor 128. Anil Khatod, CEO of AirDefense Inc. in Alpharetta, Ga., claims that the 6.0 upgrade of the software for the company's wireless network security appliances "can defend wireless devices and/or the wired devices they're connected to." The release adds client-side code that prevents online sessions from being hijacked to bogus Web sites when end users connect their laptops to public hot spots. Users are also now protected from intruders sneaking onto their machines via Bluetooth links. In addition, AirDefense 6.0 features improved network intrusion-detection and automated rogue management features, Khatod says. Pricing starts at $6,995.
John Norcross, vice president of technology at Celerant Consulting Inc.
Secure Web services need more ...
... than well-intended standards, says Joelle Gropper Kaufman, vice president of marketing at Reactivity Inc. in Belmont, Calif. Gropper Kaufman says that standards such as WS-Security "are not implemented identically by vendors." Reactivity Chief Technology Officer John Lilly adds that the existing standards aren't comprehensive.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Keeping UP with Mobile Trendsetters Global survey tracks achievements and challenges of mobile initiatives along with best practices for success.
- Assessing ROI for Mobile Acceleration Clients This EMA® paper examines the business case for deploying mobile WAN optimization client software and builds a ROI model based on the experiences...
- The Apple-ization of the Enterprise: Understanding IT's New World Read this paper for how to tackle Apple-ization (and the related consumerization of IT and Bring Your Own Device/BYOD).
- A Practical Introduction to Enterprise Mobility Management Read the white paper to better understand the basic concepts within mobility management and to learn how you can apply EMM technology to...
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Mobile Security: Containerizing Enterprise Data In this on-demand webinar, Fixmo's Lee Cocking, VP of corporate strategy, explains why Apple-ization trends like mobility and "bring-your-own-device" (BYOD) are driving the... All Mobile/Wireless White Papers | Webcasts
Our new weekly Consumerization of IT newsletter covers a wide range of trends including BYOD, smartphones, tablets, MDM, cloud, social and what it all means for IT. Subscribe now and stay up to date!