At AFCEA TechNet Land Forces East on the 16th, Wave CEO Steven Sprague presented a plenary session that posed the following question to attendees: “What is mobile?”
“Mobile,” he argued, “is a transition of the network architecture. It is a transformation from a network based on connections to a network based on identity.”
Mr. Sprague’s session delved into what this means for enterprise and government, from hardware provisioning, management, and strategy. He describes what an organization needs to do from the ground up in order to refocus the network in this way and recounts the benefits of identifying each device accessing sensitive networks & data.
Steven Sprague talks with Silicon Valley’s KLIV CEO Show about the new scrambls service, the evolution of hardware security, and innovation in the Silicon Valley and beyond. The full interview is available below.
In February, Microsoft announced its Windows 8 consumer preview. The enterprise release, rumored to be ready in October, will feature strong authentication, eDrive (Encrypted Drive) support, and UEFI for secure boot—all central concepts of Trusted Computing.
In this third installment from Steven Sprague’s interview with analyst Richard Stiennon, the conversation turns to the Windows 8 launch: what it indicates about Microsoft’s involvement in the security industry, what it means for enterprises using Windows, and how to ease the transition to the new platform.
What can’t you do with a mobile phone these days? Check corporate email, watch a video, post on Facebook… as demands for functionality on mobile devices increase, so do security vulnerabilities. Security measures in the mobile space typically focus on protecting the interests of the network operators, not that of the user, enterprise, or third party service vendors. In the interest of expanding safeguards, the Trusted Computing Group has extended their open-standard security architecture to support this explosion in use. In Part 2 of Steven Sprague’s interview with Richard Stiennon, he touches on the potential of the Mobile Trusted Module (MTM), starting with secure authentication for mobile users.
Unthinkable, right? But as Wave CEO Steven Sprague tells IT Harvest’s Richard Stiennon, if the right safeguards aren’t in place, it could happen. In the first of seven video clips, Steven elaborates on why known computing is a concept IT can’t afford to overlook. Enterprises must know which devices are allowed access to sensitive data and the capabilities of those devices. IT must know whether a device is healthy, and if they are dealing with an Advanced Persistent Threat.
Watch Security Matters for future segments on mobile, cloud, and more in the weeks to come.