Topics Archive News
May 29, 2015
As the global smartphone market slows, it's becoming readily apparent that the rise of smartphone security threats isn't slowing -- and no OS is safe.
March 07, 2014
Michelle Malcher, president of IOUG, discusses Oracle Mobile Security Suite and how using pre-existing technology can be a value-add.
February 02, 2012
BYOD enterprise policies are creating new remote access problems on the WAN. Find out how to get a better handle on iPads and smartphones invading your VPN.
June 13, 2011
It's no surprise that mobile device security was top of mind in our recent reader survey. Find out what's missing and what IT pros are asking for in mobile security products.
Topics Archive Get Started
Bring yourself up to speed with our introductory content
Wi-Fi is the popular term for a high-frequency wireless local area network (WLAN) technology and standard that has gained acceptance in many companies as an alternative to a wired LAN. Continue Reading
A secure container, in a mobile computing context, is an isolated, authenticated and encrypted area of an employee's device that keeps sensitive corporate information separate from the owner's personal data and apps. Continue Reading
Mobile payment is a point-of-sale transaction made through a mobile device. Continue Reading
Evaluate Topics Archive Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Google is beginning to encrypt data by default on its Android devices. Expert Michael Cobb explains how this change will affect enterprise BYOD security. Continue Reading
Smartphones with gyroscopes can be exploited to serve as an eavesdropping tool. Expert Nick Lewis explains how to mitigate smartphone gyroscope risk. Continue Reading
There's a lot of confusion surrounding the HIPAA compliance requirements for mobile health apps. Expert Mike Chapple finally clears it up for health app vendors. Continue Reading
Product ReviewsPowered by IT Central Station
Apps can be deployed to store devices with more ease but there was an ActiveSync issue during deploymentPowered by IT Central Station
Valuable Features: High Availability on Core and Sentry, Apple DEP support, MAM, and the BYOD Portal are valuable. • Improvements to My...Continue Reading
We've been able to meet federal compliance standards with this solution, but you should spend time planning and understanding classes of service for your company.Powered by IT Central Station
Valuable Features: Lock and erase Notifications • Improvements to My Organization: We've been able to meet federal compliance standards...Continue Reading
With these MDM and mobile content management solutions, an organization can manage their applications without any concern for the end user losing important enterprise data.Powered by IT Central Station
Valuable Features: Two of the most valuable features are the MDM, mobile device management, and the content management, the containerization...Continue Reading
Manage Topics Archive
Learn to apply best practices and optimize your operations.
When mobile vendors stop maintaining security on their devices, enterprise data is at risk. Expert Michael Cobb discusses how to assess mobile product end of life and how to create end-of-life policies and controls to maintain BYOD safety. Continue Reading
Active Directory can no longer hold down the identity management services fort. You need cloud-based authentication and identity services to step in. Continue Reading
Our VPN security and remote access expert explains how to protect against application store threats in this Ask the Expert response. Continue Reading
Problem Solve Topics Archive Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Do you have remote workers using mobile devices in the office? Before you invoke a bring-your-own-device policy, learn about the risks of BYOD. Continue Reading
Network managers can properly analyze the costs of remote and mobile workers with mobile expense management. Learn how in this tip. Continue Reading
Mobile devices are challenging telecom expense management (TEM) in the enterprise. Learn why and what potential solutions may help WAN managers. Continue Reading