Mobile Device Security
- July 10, 2019
Organizations have the tough job of creating an overarching view of identity inside and out of the company. One thing they should remember? Focus on people rather than technology.
- July 01, 2019
At a recent security and identity conference, attendees discussed the IAM market in clear terms: Shiny new features might be cool, but practicality reigns.
- June 28, 2019
In this Q&A, Ping Identity CEO Andre Durand explains why identity management is being subsumed by security and how AI and automation will modernize identity management systems.
- May 13, 2019
MobileIron launched its zero-trust security platform, so customers could use their mobile phones as secure IDs. This would eliminate the need for passwords.
- February 04, 2019
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack.
- January 28, 2019
Amazon WorkLink enables users to access behind-the-firewall content with their mobile devices and helps eliminate cumbersome VPN and mobile device management setups.
- October 10, 2018
IT admins can expose an organization to a variety of threats while using Apple DEP if they're not careful. But there are ways to sidestep a DEP security issue that could be problematic.
- August 30, 2018
Shield will provide additional security options for Box content. Attendees at BoxWorks consider how this feature could integrate with IT's existing security tools.
- June 28, 2018
Looking for an IAM engineer? They may be right under your nose. But training existing or external candidates involves a lot more than just understanding the tech.
- April 25, 2018
With many organizations using EMM to keep track of devices, apps and data, the information that users must share with printers can sometimes be forgotten.
- March 30, 2018
With so many mobile users reliant on Office 365 to get work done, it was high time Microsoft and EMM vendors made app management and security easier for IT.
- December 12, 2017
When users have to share identifying data with a third party, security risk is high. A new tool puts users in charge of their identity and attempts to make ID management seamless.
- August 22, 2017
Enterprise mobility management is crucial security technology, but it can't do everything. Mobile threat defense software helps IT stay ahead of the curve.
- July 31, 2017
IT experts have confidence in the security of iOS devices, but there are vulnerabilities to watch out for. Users often avoid passcodes, for instance.
- June 28, 2017
An IT pro at Cloud Identity Summit shares his experience implementing identity management at the University of Oklahoma and describes what pitfalls to avoid.