Preview

Kensington Addresses The Challenges Of Securing Enterprise BYOD With Its Industry Leading Physical Security Solutions More Than 132 Million Feet Of Computer Locks Sold

Good Essays
Open Document
Open Document
802 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Kensington Addresses The Challenges Of Securing Enterprise BYOD With Its Industry Leading Physical Security Solutions More Than 132 Million Feet Of Computer Locks Sold
PressReleasePing

Kensington Addresses the Challenges of
Securing Enterprise BYOD with Its IndustryLeading Physical Security Solutions; more than 132 Million Feet of Computer Locks
Sold
Leading Analyst Paper Validates the Need for Security Locks as First-Line-of-Defense in
Overall Security Strategy
Redwood Shores, CA, February 03, 2015 /PressReleasePing/ - Kensington, a worldwide leader in delivering smart. safe. simple.™ computing accessories, today announced it has sold more than 132 million feet of computer locks, enough to stretch around the world. In
September, the company revealed it had sold 20 million units of its comprehensive family of security products for mobile devices and PCs, a figure representing a 70 percent market share. As the trend of Bring Your Own Device (BYOD) continues to build momentum,
Kensington is well-positioned to capitalize on the growing concern around computing and security issues.

Research shows that the BYOD phenomenon continues to grow. In a recent IDC survey of
U.S-based IT buyers, fully one-third said their company had already instituted a formal BYOD policy, and another 19 percent said they expected to institute a formal policy in the near term.
The survey also revealed that informal support is notably higher and that while BYOD comes with many positive features, it poses daunting security challenges for even the best IT organizations. In a recently published Analyst Connection, “The Role of Physical Security in a BYOD World,”
(January 2015) IDC addresses the proliferation of BYOD and the role that physical security plays in an overall security strategy. IT departments are expected to secure a variety of notebooks and desktops, as well as phones and tablets running a wide range of operating systems. Left to their own devices, many people fail to follow even the most simple and straightforward security measures. As mobile devices proliferate, IDC expects physical security, such as device locking mechanisms, to become equally

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Satisfactory Essays

    Intel BYOD

    • 514 Words
    • 3 Pages

    Case : Intel BYOD Assignment Questions 1. Does BYOD increase productivity in workplaces? 2. Should it be encouraged or discouraged? 3. How might other firms benefit from Intel’s approach to security (as shown in case Exhibit 2)? 4. How can Intel turn BYOD into a new source of competitive advantage? 5. What decisions can Intel make to ensure security of the corporate data on an employee-owned device that is used in the workplace? 6. How should Intel manage BYOD in the face of its e-Discovery obligations? Role: Malcom Harkins, chief information security officer was facing dilemnas in taking forward the Bring your own device initiative. - By 2014 at least 70% of employees would be using their own device for at least part of their job. Issue - The difference between personal data and corporate data… was no longer limited to office hours, just as peronal data was no longer off-0 limits during office hours - Employees would be distracted by applications embedded into their devices, which could potentially lead to a negatice impact on productivity - Greater risk in data security - Intel neded control over to access and control company info.. But doing so on employee devices would violate privacy Benefits - Reduced intel's hardware cost because employees bought their own hardware but increased cost in supporting , configuring those devices - Lower cost in data because telecom charged 33% less for personal vs corp data.. Approaches - Do nithng.. And hope that bringing in own devices was a fad - Could say no to devices.. As a company policy - Supporting BYOD Plan - Had a 48 hr web jam where employees can voice about the BYOD trend.. - Create a 5 tier model to manage security ○ Lv 1.. Stock movements ○ Lv 2.. Slightly confidential info like payroll ○ Lv 3- call basic and had the least permissive level of access to corporate data ○ Lv4- intermediate- consisted of applications pertaining to specific lines of busines ○ Lv5- Managed equivalent.. Was most permissive level of…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    References: NIST (2011), Managing Information Security Risk -- Organization, Mission and Information System View, National Institute of Standards and Technology Special Publication 800-39.…

    • 721 Words
    • 3 Pages
    Satisfactory Essays
  • Best Essays

    Eddy, N. (2013). BYOD Policies to Bring 1 Billion Devices to Businesses by 2018. Eweek 5.…

    • 1383 Words
    • 6 Pages
    Best Essays
  • Powerful Essays

    Security Plan

    • 3805 Words
    • 16 Pages

    The purpose of this security plan is to elicit the potential threats to an organisation physical and electronic information holdings. Organisations in general are starting to take information security more sincerely due to the proliferation of mobile services, VPN connections, terrorism and natural disasters. We must however acknowledge that this very technology advancement is regarded as efficient but is also leading to a higher level of security risks. These risks must be mitigated to ensure the confidentiality, integrity, and availability of information assets. (The SANS Institute. 2007)…

    • 3805 Words
    • 16 Pages
    Powerful Essays
  • Best Essays

    14. The Economics Times, 2012, Bring your own device’ at workplace: The pros and cons of the new trend, The Economics Times, 9/09/2012 http://articles.economictimes.indiatimes.com/2012-08-28/news/33450634_1_byod-mobile-devices-enterprise-applications…

    • 1917 Words
    • 8 Pages
    Best Essays
  • Powerful Essays

    It is a technologically driven company with dedicated to R&D, spending over $500 million in…

    • 1726 Words
    • 9 Pages
    Powerful Essays
  • Powerful Essays

    making eBay work

    • 4280 Words
    • 18 Pages

    Many companies in today’s competitive economic environment strive to meet customer’s security demands with a great challenge for meeting those expectations. Therefore, our company went a step further in its product innovation to provide the customers with their current needs and demands for improved security.…

    • 4280 Words
    • 18 Pages
    Powerful Essays
  • Better Essays

    Mobile Malware

    • 1047 Words
    • 3 Pages

    La Polla, M., Martinelli, F., & Sgandurra, D. (2013b). A Survey on Security for Mobile Devices. IEEE Communications Surveys Tutorials, 15(1), 446–471. doi:10.1109/SURV.2012.013012.00028…

    • 1047 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    ipad Authors: Shelly Palmer, Bob Gourley, Security Gateways Related Topics: C EOs in Technology, iPhone Developer, APC Journal, iPhone for Business, Philippines, Twitter on Ulitzer, PR on Ulitzer, New Media on Ulitzer, Facebook on Ulitzer, Marketing and Sales, Wine Blog on Ulitzer, The Social Media Guide, Outsourcing on Ulitzer, iPhone Apps on Ulitzer, iPad on Ulitzer, iPad For Business, The Role of Business…

    • 2610 Words
    • 11 Pages
    Satisfactory Essays
  • Good Essays

    Computer Security

    • 792 Words
    • 4 Pages

    The importance of this fact needs to be clearly highlighted so that adequate measures will be implemented, not only enhancing the company's daily business procedures and transactions, but also to ensure that the much needed security measures are implemented with an acceptable level of security competency when there’re so many threats to the computer out there.…

    • 792 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Complete Listing of Chapter Opening Cases, Insight Cases, E-commerce in Action Cases, and Case Studies CHAPTER 1 THE REVOLUTION IS JUST BEGINNING Opening Case: Pinterest: A Picture Is Worth a Thousand Words Insight on Technology: Will Apps Make the Web Irrelevant? Insight on Business: Start-Up Boot Camp Insight on Society: Facebook and the Age of Privacy Case Study: The Pirate Bay: Searching for a Safe Haven CHAPTER 2 E-COMMERCE BUSINESS MODELS AND CONCEPTS Opening Case: Twitter’s Business Model…

    • 65839 Words
    • 331 Pages
    Powerful Essays
  • Good Essays

    Security is the degree of protection against danger, damage, loss, and criminal activity. Securities as a form of protection are structures and processes that provide or improve security as a condition Security with human responsibility and interference are now at risk of loss because of the technology that certain machines can do. One of this is the swipe card technology.…

    • 938 Words
    • 4 Pages
    Good Essays