Since the iPhone was launched last year, we've heard I.T. executives bemoan the fact that their CEOs are enamored with a device not meant for the enterprise.
Next time you look at a security product that utilizes encryption, make sure you do your research, advises Mobile Enterprise security columnist Ben Halpert. Find out why.
Sales of wireless LAN infrastructure equipment, including WLAN switches and controllers, dependent and independent access points, wireless broadband routers, and outdoor bridges, jumped 14% in 3Q07 from 2Q07, according to Infonetics Research's latest "Wireless LAN Equipment" quarterly market share report.
AuthenTec announced that its fingerprint sensor has been integrated as a standard feature into the new Motion Computing(R) F5 tablet PC.
Within the information technology field, there are many options for the creation, storage, dissemination and security of electronic healthcare records.
Mobile Enterprise invited the members of its Editorial Advisory Board to share their views on what's ahead for the wireless enterprise.
While speaking at a recent information security conference, I was asked an insightful question by an audience member: "How do we, as security practitioners, relate enterprise security decisions to the individual user?"
Everyone makes mistakes, but the nature of the mobile enterprise means employees have more chances to make simple mistakes that come with major consequences.
A Nokia VP was recently telling me about the company's newest firewalls and VPN solutions.
In enterprise security, it's not what you know that counts, but how you transmit, store and dispose of that information.