Mobile Device Security
- May 13, 2019
MobileIron launched its zero-trust security platform, so customers could use their mobile phones as secure IDs. This would eliminate the need for passwords.
- February 04, 2019
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack.
- January 28, 2019
Amazon WorkLink enables users to access behind-the-firewall content with their mobile devices and helps eliminate cumbersome VPN and mobile device management setups.
- October 10, 2018
IT admins can expose an organization to a variety of threats while using Apple DEP if they're not careful. But there are ways to sidestep a DEP security issue that could be problematic.
- August 30, 2018
Shield will provide additional security options for Box content. Attendees at BoxWorks consider how this feature could integrate with IT's existing security tools.
- June 28, 2018
Looking for an IAM engineer? They may be right under your nose. But training existing or external candidates involves a lot more than just understanding the tech.
- April 25, 2018
With many organizations using EMM to keep track of devices, apps and data, the information that users must share with printers can sometimes be forgotten.
- March 30, 2018
With so many mobile users reliant on Office 365 to get work done, it was high time Microsoft and EMM vendors made app management and security easier for IT.
- December 12, 2017
When users have to share identifying data with a third party, security risk is high. A new tool puts users in charge of their identity and attempts to make ID management seamless.
- August 22, 2017
Enterprise mobility management is crucial security technology, but it can't do everything. Mobile threat defense software helps IT stay ahead of the curve.
- July 31, 2017
IT experts have confidence in the security of iOS devices, but there are vulnerabilities to watch out for. Users often avoid passcodes, for instance.
- June 28, 2017
An IT pro at Cloud Identity Summit shares his experience implementing identity management at the University of Oklahoma and describes what pitfalls to avoid.
- June 26, 2017
Identity and access management tools are critical today, as companies seek ways to handle users' distributed resources. IT shops have tough choices in an evolving market.
- May 26, 2017
End users are in the crosshairs of business data privacy issues, especially when it comes to information gleaned from artificial intelligence technologies.
- May 22, 2017
Google last week announced Android security features that continue to heighten the company's enterprise mobility game. Enterprise security features from the big mobile operating systems, Google ...