News

News

  • February 09, 2016 09 Feb'16

    What's next for mobile biometrics

    Biometric authentication will be the future of mobile security. New software can already recognize an individual's face or voice -- and DNA could be next.

  • February 09, 2016 09 Feb'16

    Mobile enterprise application delivery struggles to catch on

    Refactoring, virtualization and other enterprise application delivery methods have a tough hill to climb in the age of Web and native mobile apps.

  • February 09, 2016 09 Feb'16

    Unified endpoint management shows promise in early days

    Not many products fulfill the promise of unified endpoint management today, but many are working towards that goal.

  • February 09, 2016 09 Feb'16

    What EMM vendors need to do next

    Going forward, EMM vendors need to work more closely with partners and manufacturers to improve their offerings. Support for more devices will also be on the docket in the coming years.

  • February 09, 2016 09 Feb'16

    IT shouldn't count out mobile Web apps

    Web apps are great for mass amounts of users, or employees that don't have a lot of storage space on their personal devices. But you won't get native application capabilities for the most part.

  • Sponsored News

    • Four Features to Look for in a Threat Intelligence Service

      Although threat intelligence platforms have been used for years by elite threat research teams at cybersecurity solutions vendors and consulting firms, they have only recently become commercially available as services. This article offers some advice on selecting a service that fits your enterprise, and specifies four features that you should seek out. See More

    • A Threat Intelligence Service Case Study: The Escelar Trojan

      In this article we explore a case study: How Unit 42, Palo Alto Network’s threat intelligence and research team, used the AutoFocus threat intelligence service to detect and analyze the Escelar banking Trojan. See More

    • How to Use a Threat Intelligence Service

      The is a new breed of threat intelligence services but how can enterprise security teams use these capabilities to detect and mitigate targeted threats? See More

    • The New Breed of Threat Intelligence Services

      The focus of most cybersecurity organizations has shifted from mass attacks to unique threats that target specific industries, specific software applications or even specific enterprises. In the vast majority of cases, it takes too long to detect, analyze and mitigate these attacks. See More

    View All Sponsored News
  • February 09, 2016 09 Feb'16

    Enterprise wearables suffer from a lack of apps

    Despite plenty of potential use cases, enterprise wearables won't come to fruition unless vendors can produce the kind of business apps users want on these devices.

  • February 09, 2016 09 Feb'16

    Enterprise wearables have a long way to go

    Wearable devices have generated a lot of hype, but they still aren't ready for the enterprise. The reason: These devices still need better apps to make them valuable for business users. The cover story in this issue of Modern Mobility ...

  • February 05, 2016 05 Feb'16

    NFL keeps Super Bowl goers entertained with Wi-Fi analytics

    With Super Bowl 50 kicking off Sunday, there is one team behind the scenes that plenty of mobile users in the stadium will be counting on -- and it’s not the Denver Broncos or Carolina Panthers. ...

  • February 01, 2016 01 Feb'16

    New CEO addresses MobileIron acquisition speculation

    Barry Mainz, who took over as CEO of the enterprise mobility management vendor in January, says pursuing a MobileIron acquisition isn't his priority.

  • January 27, 2016 27 Jan'16

    AirWatch sees huge growth as VMware prepares to cut 800 jobs

    Despite laying off its entire Workstation and Fusion groups, VMware will not discontinue those products. "Not at all," a VMware spokesperson said. "In some cases, roles and responsibilities ...

  • January 13, 2016 13 Jan'16

    Internet of Things devices aren't new, just new to you

    Without much hype, some industries have used sensors and connected devices for years. Now, Internet of Things devices are about to take off in a slew of new markets.

  • January 13, 2016 13 Jan'16

    Microsoft Continuum could be the company's golden ticket

    The Microsoft Continuum feature could be a big boost for Windows 10 devices, bringing a better experience for users and fewer help desk tickets for IT.

  • January 13, 2016 13 Jan'16

    IT in the gutter with mobile compliance

    A lot of organizations don't understand what it takes to maintain compliance on mobile. It starts with keeping track of devices and apps.

  • January 13, 2016 13 Jan'16

    Mobile compliance brings more IT complexity

    BYOD and consumerization have changed the way IT needs to approach regulatory compliance. Admins must work with legal and other departments to enforce compliance, which is challenging when employees use their own mobile devices and consumer cloud ...

  • January 12, 2016 12 Jan'16

    Citrix XenMobile 10.3 adds unified endpoint management

    As Citrix refocuses on its core offerings, the new XenMobile 10.3 gets the ability to manage desktop and laptop computers in addition to mobile devices.

-ADS BY GOOGLE

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close