TECH SPOTLIGHT

10 Simple Tips for Managing Mobile

1/18/2015
The constant cycle of smartphones and tablets kept the BYOD trend going strong, but we are also seeing a slight reverse of this move with COPE and CYOD. What works best?

3 Ways You're Holding Back Mobile Employees

1/12/2015
With more than a billion workers worldwide already mobile, enterprises that learn how to properly support and encourage these "always-on" workers will gain a major competitive edge.

The Insecurity of Shadow IT

1/11/2015
How do you keep mobile data secure when employees work outside the scope of policy? What should IT do to turn the trend around and regain influence without compromising  productivity?

Is Your Network IoT Ready?

1/5/2015
The IoT can drive significant business improvement by delivering a level of knowledge about workflows that has never been available before; it also introduces significant challenges.

Data Breach Fatigue is a Myth

12/28/2014
In 2015, more users will take security into their own hands. Third party apps and solutions will grow in popularity as consumers try and deal with privacy issues.

4 Best Practices for Secure Mobile Apps

12/19/2014
MDM and MAM can add effective security layers for employee apps, but this level of control really isn't possible for customer apps—often the biggest risk for enterprises.

The Insecurity of File Sharing

12/11/2014
To make file sharing work for the enterprise, it is important to understand that there are different motivations for sharing and address those needs securely from any device.
 |<  <  1 2 3 4 5 6 7 8 9 10  >  >| 

MOST READ STORIES

topics

Must See


FEATURED REPORT

Establishing a Mobile Security Plan

By focusing on a core security plan that involves protecting mobile devices, enterprises will create a mission-critical mobilization strategy that supports a productive workforce.