Mobile Security

Taking a User-Centric Approach to Mobility Management

3/19/2015
Legacy identity and enterprise mobility management (EMM) tools and processes were not designed for use with cloud based applications being accessed from operating systems such as iOS and Android. What does the next-generation EMM architecture look like? How do you keep the user in the center?

Wearables Low on the Security List

3/19/2015
IT departments are starting to plan for Internet of Things threats to the enterprise, but not all endpoints are priorities just yet.

Windows 10 Extends to the IoT

3/17/2015
Microsoft CEO Satya Nadella announced new solutions for data and insight at the company's annual conference for business customers.

Creating a New IT at Fairfield University

3/17/2015
Driven by mobile, CIO Paige Francis formed one comprehensive IT team—with a new face and new name—and reintroduced the function to the organization as a services partner.

3 Best Practices for Securing IoT Endpoints

3/16/2015
Hacking of inter-connected devices is already happening and one of the most effective ways to minimize threats is to design security into the product from inception.

BlackBerry Plan Covers Smartphone Accidents

3/16/2015
Dump coffee on your Leap? Drop your Passport while running through the airport? A new user protection plan from BlackBerry let's you submit a claim, even if it's your fault.

Employees Bring 1,000s of Unsafe Apps

3/13/2015
The average mobile enterprise supporting BYOD  has an app environment that can steal data, perform suspicious actions and share personal info
 |<  <  1 2 3 4 5 6 7 8 9 10  >  >| 

MOST READ STORIES

Must See


FEATURED REPORT

Building an Effective Enterprise Mobility Management Toolkit

For companies without proper management tools or those that are still riding the MDM wave, it's past time for EMM. For those well versed in mobile management, it's time to take it to the next level. This report provides the roadmap for effective next-gen tools.