Mobile Security Software and Tools News
March 07, 2014
Michelle Malcher, president of IOUG, discusses Oracle Mobile Security Suite and how using pre-existing technology can be a value-add.
June 25, 2008
Sybase iAnywhere is expanding its mobile security capabilities. With the rise of mobile malware, a smartphone doesn't have to be stolen or lost to be vulnerable to attack. With new antivirus and firewall features, the company is taking its Afaria ...
December 05, 2005
Network Chemistry has launched the industry's first public database to aggregate and communicate wireless vulnerabilities and exploits. The site alerts network administrators and IT managers of potential threats, before any damage is done.
October 19, 2005
A new study says the mobile content industry is losing billions through ringtone theft and fraud -- a trend that will continue if the market doesn't wizen up.
Mobile Security Software and Tools Get Started
Bring yourself up to speed with our introductory content
A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps. Continue Reading
Shared Key Authentication (SKA) is a process by which a computer can gain access to a wireless network that uses the Wired Equivalent Privacy (WEP) protocol... (Continued) Continue Reading
Wireless Transport Layer Security (WTLS) is the security level for Wireless Application Protocol (WAP) applications. Continue Reading
Evaluate Mobile Security Software and Tools Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Following mobile application security best practices can aid IT's mobile application management efforts and mitigate the risks of employees installing mobile apps on their devices. Continue Reading
Users love downloading apps, which can make mobile application security, especially on employee-owned BYO devices, difficult to ensure. Find out how to improve mobile app security. Continue Reading
Problem Solve Mobile Security Software and Tools Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Advancements in 4G LTE networks improved the security of cellular data transmission, but it still varies wildly from network to network. Continue Reading
IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security. Continue Reading
Ensuring security and compliance of mobile video platforms both internally and externally is an important part of an enterprise mobile video conferencing strategy. Continue Reading