Mobile Device Management (MDM)

15 Steps to Reducing Security Risks In Enterprise Mobility

12/13/2013
The risk of data loss and security breaches from mobile computing is substantial, whether it’s lost devices, hackers gaining entry via mobile employees or the steady stream of new threats coming out. This checklist is designed to help you identify key steps to take to minimize the potential for security breaches and loss of data associated with mobile devices.

Top 10 Tablet Stories of 2013

12/11/2013
IDC's Worldwide Quarterly Tablet Tracker, forecasts tablet shipments to come in 53.5% above 2012 levels, with Android and iOS leading the market. That's a lot of tablets — many of which are ending up in the enterprise. Our top tablet stories of the year reflect this takeover and the leaders as well.

Control the Access Per App

12/4/2013
Juniper Networks launches its Pulse App Connect, enabling VPN connectivity from iOS and Android devices to Junos Pulse Secure Access Service.

Ignoring the Problem Does Not Make it Go Away

12/3/2013
It's not a question of to BYOD or not BYOD. Enterprises of all sizes realize that employees are bringing in personal devices to access email, corporate data and a boatload of apps that make the workday easier. The question is security, and why isn't anyone paying attention?

Experts Evaluate their Own Data Security

11/19/2013
Even a law firm—that  routinely advises clients about how to manage data risk — needed to evaluate its own processes. The organization identified a requirement for secure file transfer technology that would meet and/or exceed security and regulatory requirements.

Employees Go Rogue with Corporate Content

11/18/2013
Enterprise data security is often discussed, but data breaches are not.  Yet by all accounts, the increased risk that has come with the increase in mobile devices is exponential, and insecure sharing is one of the big issues.

5 Considerations for BYOD Success

11/18/2013
IT departments are looking for ways to mitigate the risk of corporate data being exposed on employee-owned devices which are outside of the typical scope of control.
 |<  <  13 14 15 16 17 18 19 20 21 22  >  >| 

MOST READ STORIES

Must See


FEATURED REPORT

IoT 2020: How Inter-Connected Devices Will Impact the Enterprise

In realizing the vision of the IoT, we are in uncharted territory. It's happening so fast in so many separate pieces that managing and leveraging has escaped a majority of enterprises. This report provides a snapshot of the evolution of the IoT and examines what's to come to help you prepare for the impact—from the onslaught of technology and its unprecedented risk, to attaining the extraordinary value of innovative information.