Mobile Security: Filling the Gaps

— February 15, 2013

The danger from lost and stolen devices is an obvious threat to the enterprise, but the more obscure mobile risks from policy, apps, connectivity and more cause additional security gaps. A diligent enterprise must take a multi-layered approach to security, and continuously evaluate strategy and user behavior to minimize all risk and fill in the gaps.

 

POST A COMMENT

comments powered by Disqus

RATE THIS CONTENT

12345
Current rating: 4 (2 ratings)

MOST READ STORIES

topics

INFOGRAPHICMore >

Must See


FEATURED REPORT

Who Owns Mobility

Less than one decade ago, smartphones and tablets changed workplace technology—virtually overnight. IT lost "control" and users became decision makers. Is it any wonder we are still trying to figure things out, and that the question of  "who owns mobility" remains? This research examines the current state of mobility in an attempt to answer that question.