Mobility Strategy

The Biggest Mobile Threat

5/29/2014
Gartner predicts 75% of mobile security breaches will be the result of mobile application misconfiguration.

Mobile Threat Protection from the PC Pro

5/29/2014
A tool that processes and analyzes 10,000 new apps, every 24 hours, in more than 200 app stores to determine potential security risks is just one new feature of Symantec’s EMM solution.

BYOD in Record Time

5/27/2014
With just a few hours prep by IT, SIHO Insurance Services deployed a secure solution that lets employees enroll devices in minutes.

2 Top Mobile Trends

5/27/2014
The battle for the enterprise has grown among solution providers, as mobile needs change and more vendors hit the market. What are the broader drivers to this dynamic?

10 Top CIO Stories

5/26/2014
CIOs' jobs were complicated from the start, but throw in mobile, business expectations and unprecedented enterprise security concerns...how do they manage?  Hear first-hand from top CIOs who share their stories and outlooks.

BlackBerry Launches IoT Project Ion

5/22/2014
“Billions of connections, generating trillions of transactions and exabytes of data daily, will require platforms that can operate securely on a global scale,” according to Executive Chair and CEO John Chen.
 |<  <  6 7 8 9 10 11 12 13 14 15  >  >| 

MOST READ STORIES

Must See


FEATURED REPORT

Who Owns Mobility

Less than one decade ago, smartphones and tablets changed workplace technology—virtually overnight. IT lost "control" and users became decision makers. Is it any wonder we are still trying to figure things out, and that the question of  "who owns mobility" remains? This research examines the current state of mobility in an attempt to answer that question.