There\u2019s nothing better than having a team where all the members are gung ho about what they\u2019re doing, right? If you have that, you know nothing is going to prevent them from getting the job done. You know that and pretty much anyone you say \u201cgung ho\u201d to will know it as well. That\u2019s pretty impressive market penetration for a word that\u2019s only been around since World War II.\nThe origin of \u201cgung ho\u201d is actually a really interesting story. If you asked most people where it came from they\u2019d likely say it\u2019s Chinese or it\u2019s from the Marine Corps and those are both sort of right. Gung ho is the Anglicized version of two Mandarin Chinese characters, "g\u014dng" and "h\u00e9,\u201d which translate individually as "work" and "together.\u201d At this point you\u2019re likely thinking, \u201cOK but that\u2019s not exactly an interesting story.\u201d\nGung ho as we know it was invented by Marine Corps Major Evans Carlson who said, \u201cI was trying to build up the same sort of working spirit I had seen in China where all the soldiers dedicated themselves to one idea and worked together to put that idea over.\u201d He had seen this spirit in the Chinese Industrial Cooperatives or "g\u014dngy\u00e8 h\u00e9zu\u00f2sh\u00e8", which promoted grass roots economic development there. That got shortened to gung ho. The phrase would have gone no farther except Maj. Carlson wasn\u2019t just some random officer in the Marines. He led the 2nd Marine Raider Battalion, a World War II commando group that was one of the forerunners of today\u2019s Special Forces. The success of his operations helped spread the word throughout the corps and then into the rest of American society.\nThat gung ho team excellence and other traits the Marines are known for, like determination, vigilance and preparedness, are exactly what you want when it comes to protecting your corporate data.\nTo do that you need programs that work seamlessly to give you end-to-end control over the security of every device on your network from the server sitting next to you to the smartphone someone may be using in Hong Kong.\nIBM has exactly the team you need, three solutions that work in tandem to let you find and manage every device on your network, ensure corporate data is secure on all mobile devices and provide them all with a multi-layered defense that attacks and defuses potential threats.\nIBM Security Trusteer Apex Advanced Malware Protection\u00a0provides endpoint protection against advanced malware and targeted attacks by breaking the cyber-attack chain. It exploits specific stages of an attack chain where the attacker has relatively few execution options. By tightly controlling these chokepoints at the operating system level, Trusteer Apex breaks the attack chain and prevents the attack.\nIBM MaaS360\u00a0takes the complexity out of managing your mobile workforce\u2212from supporting a large number of smartphones and tablets across multiple mobile OS platforms, to high-volume app and document distributions. Itis the fastest way to enable mobile security for devices, applications and documents. It lets you easily define and implement powerful compliance rules based on specific events, context, and location. It is also the only mobile device management solution with FISMA certification from the US government.\nIBM Endpoint Manager helps you find and fix problems in minutes across all your endpoints regardless of OS or location. You\u2019ll achieve continuous security and regulatory compliance with more than 8000+ out of the box compliance settings and up-to-the-minute reporting on the status of all endpoints. Using customizable automatic quarantine actions, IBM Endpoint Manager can isolate out of compliance endpoints and protect against zero-day malware and vulnerability attacks until remediation is complete.\nJoin our gung ho team of experts on September 16th, 2014 at 12 pm ET as they walk you through how you can implement a gung ho strategy to securely manage your enterprise.\nClick here to register for the webcast.