Last week saw the highest high and a lowest low for the top two mobile device makers. Apple reported record 2Q15 earnings—$4.8 billion—and device sales—46% growth. Samsung's 4Q14 IT and mobile division's profit dropped 64%. How did analysts react to the news?
Laptops and servers that access and store corporate data require passwords. Mobile devices have equal access, yet many organizations do not enforce password use on those devices.
With mobility in full swing, most organizations are already vulnerable to potential security risks. The security basics of yesterday—policy, encryption, and authentication—no longer cover fundamental security needs. Here are 5 MUST-HAVES every business needs for Enterprise Mobility Management.
Every time you see the word "software" substitute "vulnerable or hackable" and every time you see "connected" substitute "exposed" and you will realize that with the IoT, every...thing is a risk.
As devices, machines and networks continue to multiply, 2015 looks to be the year when companies finally start to think more about what’s behind mobility. In this executive Q&A, Mobile Enterprise editors find out why the backend is so important for IoT success.
Organizations must seek to achieve the right balance among competing forces: security, user productivity and cost through an end-to-end solution.
Agencies are adopting BYOD to reduce costs, increase efficiency and appeal to employees, but the growth of mobile malware must be addressed.
Over 40,000 banking/finance apps in the world's top 90 app stores contain malware or suspicious binaries.
What will security look like this year for banking, retail, government and enterprise?
A cloud-based solution from JAMF Software brings iOS setup, management and protection to the end user.