SafeNet posts latest End of Sale (EOS) and End of Life (EOL) notifications for cards, tokens and middleware

SafeNet, an RJR Innovations Premier Partner, has recently released its latest EOS and EOL document concerning it’s authentication offerings.  Affected authentication devices include the iKey 2032 (both FIPS and non-FIPS), Smart Card 330 as well as the BSec middleware. SafeNet has also provided a transition plan to move to provide a smooth transition to enable clients to get access to the latest technologies.

The following table illustrates the affected products […]

RJR Innovations is excited about SafeNet’s recent acquisition of Cryptocard

As a SafeNet Premier Partner, RJR Innovations is pleased to share the news that SafeNet has recently acquired Cryptocard, an industry innovator in authentication-as-a-service. The acquisition will further extend the data protection and solutions that RJR has to offer. To learn more about this recent acquisition please read the letter addressed to SafeNet customers and SafeNet partners from Chris Fedde, Chief Executive Officer of SafeNet, Inc.
SafeNet Acquires Cryptocard: Leader in […]

Do your employees bring their own device? – BYOD

Much quicker than anticipated smartphone shipments today already exceed personal computer shipments. The astonishing rate at which new mobile devices emerge and their widespread private use is the major force behind the recent consumerization of IT: the migration of consumer devices into enterprise computing. More and more employees are bringing their personal devices to the workplace.

While mobility increases employee productivity, corporate IT management is facing new and […]

The Seven Laws of Mobile Enterprise Applications – LAW 7: MOBILE APPLICATIONS MUST CREATE REAL VALUE IN DAYS WITHOUT PROGRAMMING

The final law of good mobile software design is perhaps the most obvious and least practiced: mobilizing 10 percent of an existing application should take no more than 10 percent of the time it took to configure the parent app. Mobile applications must add by subtraction, and part of adding is making sure what is extracted can be used without significant rework. For example, large menus should not need to be recreated for handhelds — […]

The Seven Laws of Mobile Enterprise Applications – LAW 6: MOBILE APPLICATIONS MUST BE CAPABLE OF BEING ADMINISTERED WITHOUT WIRELESS DOMAIN EXPERTISE

A key benefit of implementing a mobile solution is that the business remains buffered from the complexities of wireless security, data transmission, billing, and device management. This is increasingly critical as devices, networks, and user requirements proliferate. We are already faced with a staggering set of choices when doing simple tasks, such as activating phones, selecting service plans, and procuring and provisioning new devices.

Those will continue to be complicated decisions, but they’ll pale […]