Quantcast
Channel: Blue Hill Research » Security
Browsing all 11 articles
Browse latest View live

What the Cisco Cloud Fusion Buzz Says About Snowballing Cloud Privacy Concerns

Last week, the Wall Street Journal profiled Cisco’s “Cloud Fusion” project, the company’s foray into the hybrid cloud. Hybrid solutions are a combination of public clouds with private clouds maintained...

View Article



Cloud BI or BS (1 of 5): Obtaining Market Clarity

As cloud solutions represent a growing constituency within the analytics space, Blue Hill Research has identified an increasing need for clarity regarding cloud vendors. This is the first of five...

View Article

Good Technology Unwraps it’s BoxTone Acquisition at MWC14

On the eve of the start of Mobile World Congress (MWC) in Barcelona Spain, Good Technology made headlines with its announcement of a definitive agreement to acquire BoxTone. BoxTone is a privately held...

View Article

The Internet of Things and M2M - Some Predictions for a Bubbly Next Few Years

In my last blog post I focused on enterprise security. In particular I considered the issue of knowing (or more accurately, “not knowing”) where mobile security holes lurk within any given business....

View Article

Apple's new iOS 8 & Yosemite Continuity & Handoff are Great Enterprise Additions

Sometimes it’s better to take a step back rather than take an immediate plunge. This truism can be applied to literally any tech event, but I have Apple’s World Wide Developer’s Conference (WWDC) that...

View Article


BlackBerry's Power Punch aka Encrypted BBM

Yesterday, BlackBerry Limited (NASDAQ: BBRY) announced the availability of BBM™ Protected, the first solution in the eBBM™ Suite for secure enterprise-class messaging. BBM Protected offers regulated...

View Article

Samsung's KNOX 2.0 to be Embedded in Android L - Should Your Enterprise Care?

Back near the end of January 2014 Google and Samsung signed an important mobile cross-licensing agreement. Yes, they had of course been long time partners as far as Android is concerned, but there have...

View Article

Mobile Content Management, BYOx and the Game of Thrones

Though many companies still struggle with the notion of “Bring Your Own Device” or BYOD, a significant preponderance of businesses has now adopted BYOD as standard operating procedure. The grassroots...

View Article


Taking Stock of the Legal Cloud (2/2): Paths to a Secure Legal Cloud

Previously, I observed how the evolution of the cloud has led to considerable growth in cloud solutions within legal environments. At the same time, concerns about the security and privacy of cloud...

View Article


Informatica, Permira, Canada, and $5.3 Billion Dollars

Today, Informatica announced a definitive agreement to be acquired by a company controlled by the Canada Pension Plan Investment Board and the Permira funds for about $5.3 billion. This agreement has...

View Article

Living with Legacy in an Era of Innovation – A Security Story

  Legacy is a perception of investment, and of value.  Unfortunately, legacy in the digital transformation era is seen to be a re-investment is what has been, but not what will necessarily be useful...

View Article
Browsing all 11 articles
Browse latest View live




Latest Images