Bring Your Own Device, Not Your Security Threats

As with all technologies, the biggest security threat emerges from end users’ device management habits. The best security ever devised can fall apart if a user writes their ID and password on the side of a two-factor key and then drops it in the hall. Security can also fall apart if end users visit malicious websites. Sure these threat conditions have existed since the first days of the Internet, but Bring Your Own Device (BYOD) has focused security attention on devices once again.

Read more

Business Intelligence – From Backroom to Mission-Critical

Business Intelligence (BI), as we know it today, is an industry that’s been on a wild ride for the last 25 years. It has evolved from the basic idea of a top-down methodology to store data and provide the means for better decision making to full-scale, enterprise-wide, mission-critical systems used by every corporation in the world. BI and its older brother, Data Warehouse (DW), have become necessary components for doing business in the 21st century.

Read more