Microsoft expanding security and mobile controls for Office 365

Microsoft expanding security and mobile controls for Office 365

Government IT managers will soon have more options for Office 356 data loss protection and mobile device controls.

NYPD gets 41,000 tablets, handhelds for officers

NYPD gets 41,000 tablets, handhelds for officers

The $160 million initiative will upgrade the NYPD’s mobile platform, allowing the department to outfit up to 6,000 police cars with rugged tablets and provide 35,000 handheld devices for police officers.

MobileIron updates Docs@Work to secure personal cloud

MobileIron updates Docs@Work to secure personal cloud

Docs@Work lets users access, annotate and share enterprise content regardless of location, in a variety of cloud repositories, while providing IT a centralized way to secure and manage mobile content and device policies.

8 apps for safer city intersections

8 apps for safer city intersections

Winning apps in New York City’s Connected Intersections Challenge used wearable devices and smartphone sensors in effort to drive down traffic fatalities and injuries.

Cloud-based platform for field service management

Trimble debuts cloud, dev tools for mobile field management

In related announcements, Trimble introduced a cloud-based platform for field service management, mobile workforce productivity and scheduling tools and a development environment to improve field business processes.

iRobot unveils multi-bot tablet controller, improved networking

iRobot unveils multi-bot tablet controller, improved networking

iRobot announced a multi-robot tablet controller and the uPoint Robot Radio networking solution for first responders and defense forces.

Microsoft Surface Pro 3

Surface Pro 3 stretches for the enterprise

For enterprises looking to equip staff with both tablets and laptops, Microsoft is positioning its Surface Pro 3 as a full-powered business PC and a tablet while sweetening the deal with a discount and new support program.

Mobile patient data for emergency response

FEMA adds patient tracker apps to ER toolkit

New mobile patient tracking software will improve healthcare situational awareness at disaster sites.

Forensic software extracts iPhone data even with iOS 8 encryption

Forensic software extracts iPhone data – even with iOS 8 encryption

Apple's latest security improvements in iOS 8 make iCloud backup acquisition the only way for criminal investigators to access the suspect's smartphone data.

AppVet speeds mobile devices, apps  to the battlefield

AppVet speeds mobile devices, apps to the battlefield

The NIST AppVet project developed a framework to evaluate hardware and software for off-the-shelf smartphones in military field operations.

Driverless-vehicle tech on the move

Practice lanes for driverless-vehicle tech

Autonomous vehicles will learn to navigate the complexities of urban and suburban driving in two recently established off-road cities.

Microsoft previews Windows 10 as enterprise OS

Microsoft previews Windows 10 as enterprise OS

Featuring a one universal app platform and integrated data protection, Windows 10 will be the next version of Microsoft's operating system for smartphones, desktops, tablets and laptops.

Topic Resources

  • Big Five in Overdrive: Are State and Local Networks Ready?

    As state and local government organizations grapple with tight budgets, demanding constituents, growing data volumes, and cross-government coordination challenges, the "Big Five of IT" – data center consolidation, mobility, security, big data, and cloud computing – promise to improve agency performance, productivity, and service. But are state and local networks ready? This research report examines potential network impact, state and local readiness, and how organizations can prepare for the onslaught.

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.