Skip navigation
CA, Inc.
TwitterLinkedInShare Smart Enterprise
Home Business Technology Innovation Business Technology Strategy Business Technology Execution Professional Development Smart Groups Smart Enterprise Magazine


3 Posts tagged with the mobile tag

#TechViews TweetChat 1 PM ET – Tuesday, October 29, 2013


IT security professionals need to stay ahead of disruptive trends such as mobility and cloud to mitigate risk and ensure assets – including critical and confidential customer data – remain protected. And while vendors work to provide the technologies needed to better lock down amorphous environments that extend to public cloud and onto handheld devices, IT security continues to evolve and advance to enable innovation while also managing risk. techviews.jpg


Here is a preview of the questions that will be addressed in the #TechViews Security TweetChat:

  1. What is the biggest security risk mobility poses?

  2. What is the most important mobile element to secure: device, application or backend?

  3. How is the management and security of APIs fundamental to any mobile app or cloud security project?

  4. Some say security is a hindrance to cloud, a recent study showed some say cloud security is a top benefit of cloud. Why would this be?

  5. How can businesses leverage mobility to enhance security?

  6. How can IT enable the business with new security capabilities (not just to prevent bad things from happening)?


To learn more about mobile security prior to the chat, please read the TechViews Blog: What’s the Biggest Security Risk Mobility Poses? And please download the calendar invite to the #TechViews Security TweetChat here.


Show & Notes



New & Cool


Dell announced a thumb-size PC called Project Ophelia which can turn any screen that has an HDMI port into a PC, according to this ITWorld article.


The Ubuntu Edge, a mobile phone that dual boots into Ubuntu mobile OS and Android, according to this YouTube video. The doubles as a full desktop PC, according to the project page on IndieGoGo.


At the Black Hat security conference, Security Research Labs revealed that many SIM cards are hackable with just two SMS text messages, according to this eWeek article.


A British university is holding the publication of a paper on how millions of Volkswagen vehicles anti-theft systems are at risk of being hacked after England’s High Court issued an interim injunction, according to this The Detroit News article.


Tech News

European Cloud Computing

Neelie Kroes, the vice-president of the European Commission, is calling for the creation of a European cloud network, according to this siliconrepublic article. The commissions will work to build trust in cloud computing after the PRISM revelation.


The Dutch central bank has approved Amazon Web Services for financial operations, including web site, mobile apps, retail banking platforms, high performance computing, and credit risk analysis, according to this Finextra article.


The Internet of Things

How important is cloud computing to the Internet of Things? In this SiliconAngle blog, Mike Wheatley discusses how cloud computing will handle the speed and volume of data that’s produced by the Internet of Things.


What won’t be connected to the Internet in the future? This Cisco white paper explains the Internet of Things and the value of having Internet sensors on water pipes and cows.


SMEs taking advantage of new technologies

A recent Oxford Economics study of 2,100 executives from small and medium enterprises (SMEs) in over 20 countries found that SMEs are growing globally and they are using technologies like mobile, social, and cloud to grow and increase their competitiveness, according to this Bdaily article



Bessemer Venture Partners revealed that the market capital of the top 30 cloud computing companies has reached $100 billion, according to this ihotdesk article.


New research by IDC reveals that the vast majority of businesses in Australia are using cloud computing, according to this ihotdesk article.


An NTT Europe survey reveals that cloud computing is being smothered by CIO concerns, according to this CloudTech article.


In this open letter to the OpenStack community, Randy Bias urges the OpenStack community to start embracing competitors, like Amazon Web Services and VMware.


What are the top 5 hurdles to cloud computing? This CA Technologies infographic details the top 5 barriers to cloud, including security, privacy, core business concerns, cost, and political and cultural issues. 


The cloud is having an impact on everything: how your users are accessing applications, where your data lives, and now, even on the enterprise wireless network.


These days, organizations dealing with an onslaught of wireless devices — and the growing infrastructure demands they create — are also looking at how the cloud may help them manage such tasks as provisioning, configuring and managing network infrastructure through a single, centralized interface. Hosted Wi-Fi might also support capacity requirements better with greater visibility into application consumption and prioritization. And it can save some of the CapEx (capital expenditures) of rolling out access to branch offices and teleworkers. Business continuity benefits are also gained when the infrastructure is protected by a cloud provider’s architectures for backup, security and redundancy.


Keeping Students Connected

This may sound like a lot to promise, but cloud-based Wi-Fi is gaining ground. For instance, at institutions of higher education, where pervasive Wi-Fi is increasingly a selling point for the schools and the “always-on” generation attending them, wireless LAN management challenges are common.

“Many people are carrying around smartphones about as powerful as a computer was eight years ago,” says Peter Souza, Director of Networking, Telecommunications and Technical Support at Roane State Community College in Harriman, Tenn. “[Wi-Fi] is an essential service to provide customers.”


Enterprises considering Wi-Fi-in-the-cloud options can explore different solutions, as Souza did, to find the right fit. Some vendors, such as Meraki propose moving both controller and management functionality to the cloud, for example. Others tout benefits that result from distributing controller functions to intelligent access points and using management software that can be installed on site as either a virtual or physical appliance, or alternatively, that can run in the public cloud.


Cost Savings Add Up

The distributed controller option comes with Software-as-a-Service (SaaS) advantages, including automated backup and recovery and the security of redundant data centers. Souza opted for this approach offered by Aerohive Networks when he replaced the college’s existing wireless network with 802.11n Wi-Fi. From a TCO perspective, Wi-Fi cloud-networking approaches — beginning with removing the expense of installing separate physical controllers in the infrastructure — should show savings. These costs can add up when an enterprise supports multiple locations, as does the cost of labor expended on maintaining, troubleshooting and upgrading the devices when more access points are added than a controller model can support. While larger enterprises may enjoy bigger IT budgets and staff, very few organizations have been immune to cost controls and labor reductions over the last few years.


Souza, and Assistant Network Manager Allen Foster, support nine campuses and thousands of users located a good distance apart. Tech staff can’t be at each site all the time, so avoiding the hassles and costs of purchasing, managing, troubleshooting, backing up and powering controllers at each location seemed like a good idea. At Roane State, the cloud approach eliminated wireless traffic crossing the WAN to a controller in order to be managed and firewalled. “Everything is controlled at the edge,” says Souza. Remote management in the cloud comes from the Aerohive HiveManager Online SaaS solution, which offers simple policy creation and centralized network management options regardless of location. “Being able to find a problem and fix it when you’re in a hotel room or at home in the evening is a big advantage,” says Foster. As for security, its features include 802.11i (WPA2), a wireless intrusion detection system (IDS), 802.1X authentication and rogue AP detection for more secure communications


While the wired LAN will retain a place in most large companies for a long time, many mobile devices no longer even have wired ports on them. As it becomes more important to support a robust Wi-Fi network, it is also increasingly important to support it in a way that reduces CapEx expenditures and the burdens of managing it in a pervasive-device world. For this, as for so many other reasons, the cloud may be calling.


Smart Enterprise Exchange is interested in your cloud applications. Have you considered hosting Wi-Fi? Other network apps? Would security concerns deter you from trying this approach? Share your stories with us and your peers.

Contact Us

We encourage your feedback. Reach out via the "Contact the Editor" and "Contact the Concierge" services for any needs, questions or comments. We look forward to serving you!

Paula Klein, Smart Enterprise Exchange Editor
Ellen Lalier, Smart Enterprise Exchange Concierge

TwitterLinkedInShare Smart Enterprise