Mobile Device Security

Mobile Device Security News

View All News

Mobile Device Security Get Started

Bring yourself up to speed with our introductory content

  • secure container

    A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps. The purpose is to prevent ... Continue Reading

  • local wipe

    Local wipe, also known as auto-wipe, is deletion of a device's data which is initiated by software on the device itself, rather than through remote administration. A local wipe may be automatically conducted in response to a number of failed login ... Continue Reading

  • real-time location system (RTLS)

    A real-time location system (RTLS) is one of a number of technologies used to pinpoint the current geographic position and location of a target. Continue Reading

View All Get Started

Evaluate Mobile Device Security Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

Product Reviews

Powered by IT Central Station View All Evaluate

Manage Mobile Device Security

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Mobile Device Security Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

View All Problem Solve

-ADS BY GOOGLE

SearchConsumerization

SearchNetworking

SearchTelecom

SearchUnifiedCommunications

SearchSecurity

Close