Mobile Device Security
- August 11, 2014
Desktop management software and cloud backup tools give IT pros a way to ensure employees always have access to corporate data, even when their devices fail. But they approach these goals in very different ways.
- August 07, 2014
Details surrounding the new Android L enterprise mobile container have become clear, but questions remain about how Samsung Knox will compete in the EMM space and what Google will do with its new technology.
- August 01, 2014
VMware continues to drop details about its integration with AirWatch for end user computing. Among the new items coming is a mobile container that brings together many different technologies from both companies.
- July 02, 2014
Citrix's chief security strategist says the lock-everything-down mentality can hinder mobile productivity.
- February 21, 2014
Samsung is expected to update its Knox MAM software next week, but will the changes be enough to elbow BlackBerry out of the enterprise?
- January 15, 2014
IT analysts see a change in mobile security. Now that BYOD is everywhere, ensuring data and apps are secure takes precedence over devices.
- November 13, 2013
New survey data shows BYOD is a top concern for CIOs, yet there's a large discrepancy for that in IT budgets. What can CIOs do to bridge the gap?
- September 24, 2013
BlackBerry customers that are ready to move on see mobile device security as an issue. Samsung and others offer secure mobile device alternatives.
- August 08, 2013
Organizations are warming up to NAC security products due to popularity of BYOD for robust device security and better systems integration.
- July 09, 2013
Instead of focusing on physical devices, try a new mobile endpoint management method: Look at ways to deliver data, identity and access to services.
- July 09, 2013
As employees amass devices -- PCs, personal laptops, smartphones and tablets -- endpoint management becomes increasingly difficult for IT.
- May 16, 2013
BlackBerry's Secure Work Space for iOS and Android will help heavily regulated companies or those searching for extra security to better support BYOD.
- March 26, 2013
If you take the same old heavy-handed approach to BYOD security, you can actually make the problem worse. IT must adapt and focus on data protection.
- January 22, 2013
Some enterprise mobility management technologies can be pretty complex. Secure containers aim to fix that by focusing on mobile data protection.
- August 16, 2012
Social media security involves a Pandora's box of challenges for IT pros tasked with protecting sensitive data.