GreenPages Blog

As an IT professional, you need to stay current on all things tech; with articles from industry experts and GreenPages' staff, you get the info you need to help your organization compete and succeed!

2015 Predictions: End User Computing and Security

Posted by: GreenPages Blog
Read More
All Posts

2015 Predictions: End User Computing and Security

Earlier in the week, we posted some 2015 predictions from Chris Ward and John Dixon. These predictions covered cloud, the internet of things and software defined technologies. Here are a few quick predictions around end user computing and security from Francis Czekalski and Dan Allen.


Francis Czekalski, Practice Manager, End User Computing

Short and sweet – here are four things to keep an eye on in 2015 around end user computing:

  • More integration with mobile devices
  • Wrappers for Legacy Applications to be delivered to IOS devices
  • Less and less dependency for traditional desktops and more focus of delivery on demand
  • Heightened focus on data security


end user computing and security


Francis presenting at GreenPages' annual Summit event

Dan Allen, Solutions Architect

Hacktimonium! Remember when only big companies got spam? Then small companies? Then individuals? The same is happening with hacking and digital intrusion. This trend will continue into 2015. Having a Firewall isn’t going to be enough; you need to have some sort of implemented Intrusion Prevention Services like an ASA with sourcefire, Radware appliance, or even some of the smaller brands have a Unified Threat Management piece.

A Year in review: Who got hacked last year?

The Big Ones

  • Apple’s iCloud – Individual accounts hacked.
  • JP Morgan Chase – Enterprise network hacked
  • Sony – Individual and then enterprise hack
  • UPS
  • Target

A list of others you might know.

  • AOL
  • Ebay
  • Living Social
  • Nintendo
  • Evernote
  • USPS
  • Blizzard
  • SnapChat
  • NeimanMarcus
  • Home Depot
  • Washington State Justice Computer Network
  • Yahoo-Japan
  • Dominos-France

The final word here? You Won’t Know You’ve Been Hacked Until It’s Already Gone.

What do you think 2015 has in store around end user computing and security?


By Ben Stephenson, Emerging Media Specialist


Related Posts

Tech News Recap for the Week of 03/01/21

If you had a busy week and need to catch up, here’s our recap of tech stories you may have missed the week of 03/01/21!

Microsoft Exchange Zero-Day Vulnerabilities Being Actively Exploited in The Wild

By Randy Becker, CISO & VP, Network and Security Consulting It isn’t common for Microsoft to release a security update for an 11-year-old server application. So, when they do, people take notice. Especially when tied to Email. Microsoft has just released out-of-band security updates for a zero-day exploit that is actively being exploited in the wild. Of significant importance is that this is for all supported Microsoft Exchange versions plus Exchange 2010.

Zero Trust Does Not Mean Zero Access

By Randy Becker, CISO & VP, Network and Security Consulting Zero Trust is not new, but it has recently started to show up a lot in security circles. A quick search shows that there are a lot of organizations with thoughts on this topic. Given the infamous SolarWinds breach, we are starting to hear more about “Zero Trust,” “Defense in Depth,” and my personal favorite “Assume the Breach.” Last Friday CISA quietly posted the following important guidance on Zero Trust: NSA Releases Guidance on Zero Trust Security Model. This should be on the short list of reading for everyone.