Jul 132011

UPDATE:  There is still time to sign up!  We have seven spots still available for our July 20th free CIO symposium on BYOD in the Workplace. The luncheon symposium is being held at the Bowie Conference Center at 11am to 5pm.

Sign up now to ensure you and your deputy have reservations for this special event.  Please follow or tweet with us live using hash tag #byodforum.

As of today, CIOs and their deputies from the following companies have registered to attend.

Alex Brown Realty
American Chemistry Council
American Federation of Teachers
American Forest Products
Andrews FCU
Advanced Medical Management
American Health Insurance Plans
Apple FCU
Berman Goldman and Ribakow
Bishop McNamara High School
Bryn Mawr School
Erickson Living
Feld Entertainment
Franklin & Prokopik
Friends School
Gerstell Academy
Gilman School
Greenhorne & O’Mara, Inc.
Johns Hopkins FCU
National Wildlife Federation
National Institutes of Health FCU
Niles Barton
Police FCU
Radio One
SmartLink, LLC
Structural Group,Inc
Tydings Law
United States Naval Academy
United Therapeutics Corporation

Jul 012011

What is happening with smartphones, tablets, and other devices is that with having this equipment in the workplace, IT may now be required to provide access and support for the users.

It used to be that one could offer a Blackberry device and you’re done. Users are happy and you are safe and secure.  Now with proliferations of consumer devices like iPads, etc., offering only Blackberry as a solution is no longer an option.

A Whackamole situation is now emerging; where you attack the head that pops up with the mallet, hoping it will not reappear but it always does. How do you embrace these devices and have a security architecture and policy framework that accommodates these various devices?

Architecture decisions are at the core of this topic.  I really don’t care which Suite you chose (Vmware, Citrix, Microsoft, etc.) in the diagram below. What I do care about is can you answer and deploy your apps to BYOD gear in these 6 areas?

Also, can you confidently prove how you plan on granting access to your applications using various devices across your architecture?  You are responsible for granting ‘cross device access’.

How can ubiquitous access be granted with the fewest, fewest, simplest methods possible?  It all starts with architecture which you can see below.

Jun 052011

DavCo enlisted RedZone Technologies – a key sponsor of the CIO Executive Series – to help DavCo become fully PCI compliant within a secure remote network. 

Watch Stacy Duncan, IT Director at DavCo and James Crifasi, CTO at RedZone Technologies as they share how they successfully implemented SonicWALL solutions to achieve PCI compliance for DavCo.