Access your Pro+ Content below.
Layered security is IT's best defense
This article is part of the Modern Mobility issue of July/August 2016 issue, Volume 2, Issue 7
Businesses need to protect themselves from different types of mobile threats -- not just the portability and connectivity of smartphones and tablets. Mobile devices have blown away the notion of a corporate network perimeter, but threats now extend much further than devices boundaries'. Vulnerabilities such as malware, direct attacks, data interception, exploitation and social engineering are evolving -- on endpoints in our hands, at our desks, on our networks and in our service providers' data centers. This reality is precisely why the concept of defense-in-depth -- the practice of implementing multiple security countermeasures, or layers, to protect data -- resonates. Defense in depth requires advanced security tools, particularly as organizations become more reliant on modern operating systems, applications and even Internet of Things devices. Implementing the best layered security model is no easy task, however. Device manufacturers such as Apple and Samsung have made tons of progress by adding important embedded security ...
Access this PRO+ Content for Free!
Features in this issue
Mobile devices aren't the only thing putting the enterprise network at risk. IT admins must grapple with a host of security threats, requiring a layered security model.
Mobile users have a need for speed, which gives IT some data processing headaches. But new mobile data analytics tools help IT process data in real time and improve user experience.
The best doesn't come cheap. At $699, the HTC 10 has a lot to offer, from impressive speakers to its rapid Quick Charge feature.
Applications and data used to all live on Windows desktops, but today's users access many of their resources elsewhere. Workspaces might be the best way for IT to regain central management.
Enterprise social collaboration means more than office chitchat. When done right, it can boost employee productivity by encouraging participation and open communication.
News in this issue
Keep it secret, keep it safe -- that's what mobile users want for their personal data, even if it's on a work device. Enter the need for mobile device privacy policies in the workplace.