Mobile Device Security
- January 23, 2020
Intercept X for Mobile is compatible with iOS and Android devices, as well as Chrome OS and Chromebooks. It offers privacy protection, authentication and other security features.
- December 11, 2019
Mobile devices provide productivity benefits but introduce security concerns, a delicate balance for IT pros that surfaces in this year's list of most read stories.
- September 13, 2019
Apple's new line of iPhones made headlines for better battery life and cameras, but it's the improved security features that will matter most to the enterprise.
- July 10, 2019
Organizations have the tough job of creating an overarching view of identity inside and out of the company. One thing they should remember? Focus on people rather than technology.
- July 01, 2019
At a recent security and identity conference, attendees discussed the IAM market in clear terms: Shiny new features might be cool, but practicality reigns.
- June 28, 2019
In this Q&A, Ping Identity CEO Andre Durand explains why identity management is being subsumed by security and how AI and automation will modernize identity management systems.
- May 13, 2019
MobileIron launched its zero-trust security platform, so customers could use their mobile phones as secure IDs. This would eliminate the need for passwords.
- February 04, 2019
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack.
- January 28, 2019
Amazon WorkLink enables users to access behind-the-firewall content with their mobile devices and helps eliminate cumbersome VPN and mobile device management setups.
- October 10, 2018
IT admins can expose an organization to a variety of threats while using Apple DEP if they're not careful. But there are ways to sidestep a DEP security issue that could be problematic.
- August 30, 2018
Shield will provide additional security options for Box content. Attendees at BoxWorks consider how this feature could integrate with IT's existing security tools.
- June 28, 2018
Looking for an IAM engineer? They may be right under your nose. But training existing or external candidates involves a lot more than just understanding the tech.
- April 25, 2018
With many organizations using EMM to keep track of devices, apps and data, the information that users must share with printers can sometimes be forgotten.
- March 30, 2018
With so many mobile users reliant on Office 365 to get work done, it was high time Microsoft and EMM vendors made app management and security easier for IT.
- December 12, 2017
When users have to share identifying data with a third party, security risk is high. A new tool puts users in charge of their identity and attempts to make ID management seamless.
- August 22, 2017
Enterprise mobility management is crucial security technology, but it can't do everything. Mobile threat defense software helps IT stay ahead of the curve.
- July 31, 2017
IT experts have confidence in the security of iOS devices, but there are vulnerabilities to watch out for. Users often avoid passcodes, for instance.
- June 28, 2017
An IT pro at Cloud Identity Summit shares his experience implementing identity management at the University of Oklahoma and describes what pitfalls to avoid.
- June 26, 2017
Identity and access management tools are critical today, as companies seek ways to handle users' distributed resources. IT shops have tough choices in an evolving market.
- May 26, 2017
End users are in the crosshairs of business data privacy issues, especially when it comes to information gleaned from artificial intelligence technologies.
- May 22, 2017
Google last week announced Android security features that continue to heighten the company's enterprise mobility game. Enterprise security features from the big mobile operating systems, Google ...
- April 05, 2017
MAM provider Apperian looks to take advantage of a larger support staff and new mobile application security technology following its acquisition by Arxan.
- March 07, 2017
Organizations that use Sophos desktop management are intrigued by new EMM features the company continues to add. Some may move their mobile devices to Sophos for a UEM approach.
- February 02, 2017
Even mobile security software sometimes falls prey to vulnerabilities. VMware this week issued a security advisory regarding vulnerabilities with its AirWatch Agent and Inbox apps for Google ...
- January 27, 2017
President Donald Trump is causing quite the stir at the White House as he continues to use his personal smartphone for some purposes. Trump still uses his "old, unsecured Android phone, to the ...
- December 27, 2016
IT shops need to stay on top of the latest mobile advancements, but which are the most crucial to the enterprise? Three mobile trends could dictate the future of mobility.
- August 31, 2016
Identity Manager provides user authentication and access control, both in the cloud and on-premises. VMware provided an overview of both models in a VMworld 2016 session.
- August 31, 2016
The new API Access Management platform from Okta lets businesses build mobile apps that have identity-based access to third-party software and services.
- August 26, 2016
The latest version of Google’s OS, Android Nougat, has new security features such as file-level encryption. But it’s only available for Google Nexus devices right now.
- August 19, 2016
Recent advancements in mobile security technology allow smartphone vendors to offer more built-in features, such as the iris scanner in the new Samsung Galaxy Note7.
- July 15, 2016
You can't hang a "Do not disturb" sign on a mobile device. But users want their privacy when it comes to working on smartphones and tablets. IT must figure out how to balance their personal privacy with the ability to secure corporate apps and data ...
- July 15, 2016
Keep it secret, keep it safe -- that's what mobile users want for their personal data, even if it's on a work device. Enter the need for mobile device privacy policies in the workplace.
- May 11, 2016
Okta and Box expand their partnership to include mobile identity management and single sign-on capabilities. EMM vendors, such as MobileIron and VMware AirWatch, also get in on the game.
- May 06, 2016
Any successful effort to establish technology standards needs buy-in from all major stakeholders. The AppConfig Community, which aims to promote mobile application management standards, is about to ...
- April 22, 2016
Apple's enterprise security features draw praise from IT pros who say iOS data protection and encryption make the operating system a strong business platform.
- April 04, 2016
More mobile administrators are seeking IT certifications to show off their expertise. Security is a critical part of learning the ins and outs of enterprise mobility.
- March 10, 2016
These common mobile security threats are rapidly growing due to user negligence, and because IT doesn't always know the best ways to combat them.
- March 09, 2016
Some risks to mobile data security might keep admins up at night, but there are others IT can rest easy about.
- February 25, 2016
The clash between privacy and security is an increasingly difficult one to settle in the age of mobile devices. The current front-page case, in which the FBI wants Apple to create an iOS backdoor ...
- February 23, 2016
IT admins at IBM InterConnect reveal some of their top security concerns, from managing user access to safeguarding apps and data, and more.
- February 09, 2016
Biometric authentication will be the future of mobile security. New software can already recognize an individual's face or voice -- and DNA could be next.
- February 01, 2016
Barry Mainz, who took over as CEO of the enterprise mobility management vendor in January, says pursuing a MobileIron acquisition isn't his priority.
- January 13, 2016
A lot of organizations don't understand what it takes to maintain compliance on mobile. It starts with keeping track of devices and apps.
- January 13, 2016
BYOD and consumerization have changed the way IT needs to approach regulatory compliance. Admins must work with legal and other departments to enforce compliance, which is challenging when employees use their own mobile devices and consumer cloud ...
- November 11, 2015
Mobile apps, the Internet of Things and "comfortable computing" are primed to dominate the industry next year.
- November 10, 2015
Microsoft acquired Secure Islands in a deal to bolster Microsoft's Azure Rights Management Service with file-level security technologies.
- November 06, 2015
Dropbox rolled out its new business-focused file-sharing platform, Dropbox Enterprise, which could turn around its reputation of being the most blacklisted business app.
- October 15, 2015
VMware plans to expand AirWatch's Atlanta offices and looks to integrate newly acquired Boxer into the EMM vendor's platform.
- September 24, 2015
IT continues to walk a fine line between securing employee devices and allowing them a level of privacy.
- September 23, 2015
AirWatch added Windows 10 support, launched a privacy initiative and made friends with a number of security software providers to bolster its EMM tool.
- September 15, 2015
FinalCode's software allows IT to keep tabs on all their corporate docs.
- May 14, 2015
Citrix ShareFile will allow for third-party DLP integration within its data zones, as IT shops look for a balance between ease of use and security.
- May 08, 2015
IT has more controls than ever for Microsoft's new Outlook mobile apps, yet only those with Intune can use its new MAM.
- April 21, 2015
BlackBerry's focus on software and services continues with an acquisition that gives customers a secure enterprise file sync-and-share tool.
- April 15, 2015
With high-profile data breaches becoming more prevalent, IT can look to tools that protect mobile devices down to the file level.
- November 04, 2014
IT should rest easy about where their data lives in the consumerization age, but there's no one-size-fits-all approach to reaching that peace of mind.
- September 19, 2014
Samsung has answered questions about the future of Knox with three new versions of its EMM product, two of which will be free.
- August 11, 2014
Desktop management software and cloud backup tools give IT pros a way to ensure employees always have access to corporate data, even when their devices fail. But they approach these goals in very different ways.
- August 07, 2014
Details surrounding the new Android L enterprise mobile container have become clear, but questions remain about how Samsung Knox will compete in the EMM space and what Google will do with its new technology.
- August 01, 2014
VMware continues to drop details about its integration with AirWatch for end user computing. Among the new items coming is a mobile container that brings together many different technologies from both companies.
- July 02, 2014
Citrix's chief security strategist says the lock-everything-down mentality can hinder mobile productivity.
- February 21, 2014
Samsung is expected to update its Knox MAM software next week, but will the changes be enough to elbow BlackBerry out of the enterprise?
- January 15, 2014
IT analysts see a change in mobile security. Now that BYOD is everywhere, ensuring data and apps are secure takes precedence over devices.
- November 13, 2013
New survey data shows BYOD is a top concern for CIOs, yet there's a large discrepancy for that in IT budgets. What can CIOs do to bridge the gap?
- September 24, 2013
BlackBerry customers that are ready to move on see mobile device security as an issue. Samsung and others offer secure mobile device alternatives.
- August 08, 2013
Organizations are warming up to NAC security products due to popularity of BYOD for robust device security and better systems integration.
- July 09, 2013
Instead of focusing on physical devices, try a new mobile endpoint management method: Look at ways to deliver data, identity and access to services.
- July 09, 2013
As employees amass devices -- PCs, personal laptops, smartphones and tablets -- endpoint management becomes increasingly difficult for IT.
- May 16, 2013
BlackBerry's Secure Work Space for iOS and Android will help heavily regulated companies or those searching for extra security to better support BYOD.
- March 26, 2013
If you take the same old heavy-handed approach to BYOD security, you can actually make the problem worse. IT must adapt and focus on data protection.
- January 22, 2013
Some enterprise mobility management technologies can be pretty complex. Secure containers aim to fix that by focusing on mobile data protection.
- August 16, 2012
Social media security involves a Pandora's box of challenges for IT pros tasked with protecting sensitive data.
- August 02, 2012
Apple's acquisition of AuthenTec takes away Samsung's Android security tool and gives Apple a way to offer secure iPads and iPhones to enterprises.
- July 25, 2012
As cloud and mobile take root in enterprises, identity management takes center stage and some say Active Directory isn’t enough.
- April 25, 2012
Security expert Rich Mogull offers advice on ways to support BYOD and data security in the consumerization age.
- June 13, 2011
It's no surprise that mobile device security was top of mind in our recent reader survey. Find out what's missing and what IT pros are asking for in mobile security products.
- February 21, 2011
Tablet PCs are taking IT departments by storm, and security is top of mind. In this Q&A with industry expert Nick Arvanitis, you'll learn the importance of having a mobile policy and how to approach tablet and mobile security from the top down.
- September 29, 2010
Smart phones like the iPhone, BlackBerry and HTC range are winning many users in business. We explain the threats they represent, and offer a glimpse of how security pros can address those risks.
- October 29, 2008
Browser exploits, botnets and more will soon be coming to mobile devices, according to a report from the Georgia Tech Information Security Center. Knowing the key threats can help ward off the greatest dangers.
- August 06, 2008
Apple is advertising the iPhone 3G as something that consumers can use at work. IT managers with high security requirements beg to differ. They want full device encryption and centralized policy enforcement before they'll even let one in the ...
- April 14, 2008
Following their big wins in the FCC's 700 MHz spectrum auction, both Verizon and AT&T have announced they will operate 4G service on the spectrum.
- January 16, 2008
KoolSpan's new TrustChip technology could spark interest in mobile device voice encryption with its smaller form factor, ease of use, and low price.
- November 21, 2007
Google's Android platform, still months away from deployment, could raise a host of security concerns.
- October 17, 2007
Mobile security topped the mobility issues companies face, but recent results of a SearchMobileComputing.com survey found many organizations aren't putting security measures and policies in place.
- September 19, 2007
Mobile security breaches have CIOs fearful and ready to re-examine their corporate mobile security needs, a recent study has found.
- August 01, 2007
Mobile viruses are evolving beyond being considered a nuisance into a true threat to security, privacy and compliance.
- January 31, 2007
A mobile GPS system shipped with a virus that could infect the corporate network.
- December 20, 2006
Mobile spyware has popped up a few times recently. Researchers say it isn't time to worry -- yet.
- December 13, 2006
Mobile devices are frequently being left behind in taxis despite warnings to protect them and the data they hold.
- October 11, 2006
Strong mobile policies have become necessary to ensure mobile security. But security policies aren't worth the paper they're printed on if they're not enforced.
- September 06, 2006
Phishing attacks are no longer limited to email. Recently, researchers uncovered phishing scams using SMS, and mobile experts say enterprises should be wary of these so-called SMiShing scams.
- August 16, 2006
At this month's Black Hat conference, a presentation centered around BBProxy, a hacking program that can take advantage of the trust relationship between a BlackBerry and an enterprise's internal server to hijack network connections.
- August 02, 2006
Mobile security can no longer be an afterthought. Mobile experts say security starts, but doesn't end, with policy.
- July 10, 2006
It remains to be seen if personal data on millions of veterans and active duty personnel was copied from the laptop or compromised in any other way.
- April 26, 2006
Mobile viruses are still somewhat of an unknown. They're out there, but they've only just begun. What are they, what do they do, and what can you do for protection?
- March 13, 2006
By themselves, Crossover and RedBrowser are fairly harmless, but they're a sign that the digital underground is likely working toward large-scale attacks against handheld devices.
- November 09, 2005
While hackers, worms and viruses can attack a wireless network, experts say valuable data more often becomes the victim when a device is lost or stolen.
- November 23, 2004
The wireless LAN security and management vendor has trimmed its staff and is reworking its strategy, the latest sign that the WLAN market could be moving toward a dramatic consolidation.
- August 10, 2004
Bluetooth is becoming commonplace in the enterprise and otherwise, but researchers say Bluetooth devices aren't secure and can threaten the security of corporate network data.
- March 09, 2004
At Gartner's Wireless and Mobile Summit, a top analyst said that keeping a Wi-Fi network safe takes much more than the latest encryption -- it takes strong policies as well.