New & Notable
Mobile Device Security News
March 07, 2014
Michelle Malcher, president of IOUG, discusses Oracle Mobile Security Suite and how using pre-existing technology can be a value-add.
June 13, 2011
It's no surprise that mobile device security was top of mind in our recent reader survey. Find out what's missing and what IT pros are asking for in mobile security products.
February 21, 2011
Tablet PCs are taking IT departments by storm, and security is top of mind. In this Q&A with industry expert Nick Arvanitis, you'll learn the importance of having a mobile policy and how to approach tablet and mobile security from the top down.
October 29, 2008
Browser exploits, botnets and more will soon be coming to mobile devices, according to a report from the Georgia Tech Information Security Center. Knowing the key threats can help ward off the greatest dangers.
Mobile Device Security Get Started
Bring yourself up to speed with our introductory content
A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps. The purpose is to prevent ... Continue Reading
Local wipe, also known as auto-wipe, is deletion of a device's data which is initiated by software on the device itself, rather than through remote administration. A local wipe may be automatically conducted in response to a number of failed login ... Continue Reading
A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target. Continue Reading
Evaluate Mobile Device Security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
As users grow more mobile device-dependent, enterprise mobile security has become imperative. This chapter from "Mobile Application Security" details how to protect devices and safeguard mobile apps. Continue Reading
Manage Mobile Device Security
Learn to apply best practices and optimize your operations.
The tablet invasion has many enterprises rushing to accommodate end-user demand and bypassing a mobile device strategy to deal with mobile security and policies on an ad hoc basis. Continue Reading
Tablets are taking the enterprise by storm, and tablet security is a major concern. Find out which mobile device security best practices you're already using can apply to tablets, and which you will need to revisit to keep tablets secure. Continue Reading
As enterprise iPad use increases, companies must make decisions about iPad security policy and how to enforce it. Lisa Phifer offers several tactics for ensuring iPad endpoint integrity. Continue Reading
Problem Solve Mobile Device Security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security. Continue Reading
Lack of a systematic, efficient mobile patching process will likely be the biggest challenge of mobile device security. Continue Reading
Tablet devices are flooding into the enterprise, disrupting IT support plans and mobile security practices. Find out the business benefits and potential risks tablet devices pose. Continue Reading