Scott Perry

About

Blog Posts 1-10 of 14

A Platform Approach to Authentication. . . ‘cause you just can’t keep changing things out!

June 7, 2011 by Scott Perry     No Comments

Last week I was pretty proud of myself when I came up with the term “Breach Speed” (See: “When things are moving just a little too quickly . . .  the whirlwind of data breaches” ); and I know my colleagues have had to live with me being a little more insufferable than usual , [Read More...]

I would be just as keen if the 5th Mobile Banking Summit was in Fargo. Honestly!

June 6, 2011 by Scott Perry     No Comments

For the past week or so I’ve posted a few things to the Enterprise Authentication blog (as an example, see:  Finally – I can bring my iPad to work) – but amongst us Auth & Fraud people that’s kind of like a fighter pilot flying a cargo plane. . .  it’s not that hard, but [Read More...]

A graphic example of Mobile productivity. . . uhmm, sorry about the pun!

June 3, 2011 by Scott Perry     No Comments

A couple of days ago I wrote a little piece on the growth of mobile devices in the enterprise, and then tied it to the release of Entrust identityGuard 10 – in a little bit of shameless corporate promotion. But hey, I’m in marketing and I get well compensated for doing just that!  I had [Read More...]

Finally – I can bring my iPad to work!

June 1, 2011 by Scott Perry     No Comments

I’m going to throw a bunch of statistics at you, because I think statistics provide instant street-cred (at least until you drill below the surface a little bit) and, by extension, I think that marketing people sometimes need some street cred. So here we go:

  • 21% of companies have no restrictions on the use of personal devices – while 58% have lightweight policies and only 20% have stringent guideline – this I got from a USA Today article;
  • 40% of organizations responding to a recent McAfee survey reported mobile devices lost or stolen often involve the loss of critical business data
  • More than 50% of large enterprises expect to purchase tablets for employees over the next year – from Morgan Stanley
  • 50% of firms have embraced a mobile platform strategy
  • 60% of firms provide some support to personal devices (Forrester Fall 2010)
  • 56% of enterprises allow personally owned smart phones to access company resources
  • 16% of CIOs and IT leaders see mobility as a critical priority and 46% see it as a high priority (Forrester September 2010)
  • 75% of organizations deploy mobile applications to increase worker productivity, and 65% to increase worker responsiveness
  • 61% of enterprises will deploy 2FA mobile devices to their executives within 12 months, 59% to field service employees and 58% to their sales force (Forrester Technology Adoption Profile commissioned for Entrust)
Filed Under:
Tagged With:

Enterprise Data Breaches. . . or why I’m really not cheating on you!

May 30, 2011 by Scott Perry     No Comments

I’ve decided to branch out. Now folks, don’t go getting jealous – I’m still here for all of you who’ve come to appreciate my thoughtful, articulate and witty insight around issues tied to authentication and fraud detection – ok, I guess I’m laying it on a bit thick eh?!   But anyway, I just posted a blog today on [Read More...]

Filed Under:

When things are moving just a bit too quickly. . . the whirlwind of data breaches!

May 30, 2011 by Scott Perry     No Comments

I’ve just coined a new term – at least I think I can take credit for it – and remember, you heard it here first: “Breach Speed” . I derived it from the dramatic speed at which data breaches are occurring.  Borrowing from the Urban Dictionary, I’d see it something like this: Breach Speed: A [Read More...]

Filed Under:
Tagged With:

Protecting My Business and Personal Online Identity. . . or, how Meg Ryan could be my downfall!

May 11, 2011 by Scott Perry     No Comments

I thought this was an interesting story:  “Webmail gets hacked, corporate passwords exposed”, and one that ought to be read by executives in many companies – the folks who can actually change behavior that could otherwise jeopardize corporate security.  But it’s also a story that is highly relevant to consumers because they – “we” – [Read More...]

Embedded Security for Mobile Applications . . . Way Cool!

May 3, 2011 by Scott Perry     No Comments

I’m going to start this blog off by sounding like a corporate hack! Ok, I know, as a marketing person, I’m supposed to be kind of a corporate hack; but I don’t generally act like one, I certainly don’t dress like one, and I try not to sound like one.  But today Entrust dropped a [Read More...]

Filed Under:

When it comes to me and Jude, I’m pretty sure I’d be willing to sacrifice a little security!

April 25, 2011 by Scott Perry     No Comments

So, Facebook has introduced what they term two-factor authentication to the social networking site!  I read a response from someone working for a large security company who said the company (I clicked on their handle and it linked me to Symantec)  “commends Facebook for broadening security options. . .” . To me, this is similar [Read More...]

If you’re going to tether – make sure you know who you’re tethering with!

April 21, 2011 by Scott Perry     No Comments

Most of the items that I’ve written here have dealt with the consumer space – online banking and the like – as has the one piece written by my colleague Mike (yup, that was a little dig at my good friend Mike). But many of the same threats that target online consumers, retail banking customers [Read More...]