Mobile Security

Evaluating Apple and Samsung After Earnings

2/3/2015
Last week saw the highest high and a lowest low for the top two mobile device makers. Apple reported record 2Q15 earnings—$4.8 billion—and device sales—46% growth. Samsung's 4Q14 IT and mobile division's profit dropped 64%. How did analysts react to the news?

Why You Need Mobile Security Now

2/2/2015
Laptops and servers that access and store corporate data require passwords. Mobile devices have equal access, yet many organizations do not enforce password use on those devices.

5 Must Haves for EMM

2/1/2015
With mobility in full swing, most organizations are already vulnerable to potential security risks. The security basics of yesterday—policy, encryption, and authentication—no longer cover fundamental security needs. Here are 5 MUST-HAVES every business needs for Enterprise Mobility Management.

IoT Security is Not One-Dimensional

1/27/2015
Every time you see the word "software" substitute "vulnerable or hackable" and every time you see "connected" substitute "exposed" and you will realize that with the IoT, every...thing is a risk.

Integration in the Post Web Enterprise

1/27/2015
As devices, machines and networks continue to multiply, 2015 looks to be the year when companies finally start to think more about what’s behind mobility. In this executive Q&A, Mobile Enterprise editors find out why the backend is so important for IoT success.

The Components of EMM

1/25/2015
Organizations must seek to achieve the right balance among competing forces: security, user productivity and cost through an end-to-end solution.
 |<  <  1 2 3 4 5 6 7 8 9 10  >  >| 

MOST READ STORIES

Must See


FEATURED REPORT

5 Steps to a Bulletproof BYOD Strategy

BYOD is nearly a standard—with 90% of organizations predicted to support some aspect of BYO by 2017, but have most organizations really taken all the steps needed to protect and manage the environment?