article thumbnail

MDM migration in 8 easy steps

Jamf

Kyle Ericson, a systems engineer at a large manufacturing organization, explains how to easily move from an existing mobile device management (MDM) solution to Jamf.

MDM 73
article thumbnail

MDM migration in 8 easy steps

Jamf

Kyle Ericson, a systems engineer at a large manufacturing organization, explains how to easily move from an existing mobile device management (MDM) solution to Jamf.

MDM 73
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

These 3 GDPR Requirements You Must Support Today are Nothing Compared With What’s Coming

Reltio

Your organization may be considering master data management (MDM) solutions to address various data management needs including compliance challenges. CONSENT MANAGEMENT – Your company must also support a provision to produce any proof of consent provided by your customer on request, and a way for customers to withdraw the consent.

GDPR 70
article thumbnail

Everyone Needs Master Data Management (MDM), But Don’t Call It That

Reltio

Everyone Needs Master Data Management (MDM), But Don’t Call It That. A few weeks ago I was speaking to a senior executive in one of the largest global consulting firms and his comment - “Everyone needs MDM but don’t call it MDM” - gave me immediate food for thought. So why does MDM carry so much baggage from the past?

MDM 98
article thumbnail

#ModernDataMasters: Scott Taylor, “The Data Whisperer”

Reltio

In MDM there’s a lot of data sorting, taxonomies, ontologies etc. I am not a practitioner in the MDM technology space – I am someone who can convey its value to the business. I’m more of a “why” guy than a “how” guy. The current approach to MDM at a very high level is pretty much the same as it has always been.

MDM 40
article thumbnail

SBOMs: Securing the Software Supply Chain

eSecurity Planet

Need for Standardization The Vulnerability-Exploitability eXchange (VEX) Advantages of SBOM Adoption How to Create a SBOM Proof of Concept: Healthcare SBOM What SBOMs Mean for Cybersecurity. Also read: How to Defend Common IT Security Vulnerabilities. How to Create a SBOM. Jump to: What is a Software Bill of Materials (SBOM)?

Security 135
article thumbnail

Network Protection: How to Secure a Network

eSecurity Planet

Operating technology (OT), also known as the industrial internet of things (IIoT), uses smart pumps, conveyor belts, motors, and manufacturing equipment — and the operations teams that install the devices may not always inform the network security team about them. and mobile (phones, tablets, etc.)

Security 109