Enterprise mobile security
Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security.. See complete definition.
New & Notable
Enterprise mobile security News
-
December 04, 2020
04
Dec'20
Google launching basic Android device management
Google's Android Enterprise Essentials will let small businesses add necessary security to their Android devices without the complexity of more advanced management products.
-
June 19, 2020
19
Jun'20
Microsoft Authenticator for Android update adds options
This month's Microsoft Authenticator for Android update allows users to check their recent account activity and change passwords within the password management app.
-
May 06, 2020
06
May'20
IT needs durable remote work strategy to keep employees home
After the initial rush, IT admins are now faced with how to keep remote work going.
-
March 25, 2020
25
Mar'20
How zero-trust authentication and architecture have evolved
Zero-trust architecture has spread across the enterprise security software market, so IT pros should understand the latest advancements in zero-trust authentication.
Enterprise mobile security Get Started
Bring yourself up to speed with our introductory content
-
Differences among WEP, WPA, WPA2 and WPA3 wireless security protocols
As wireless networks have evolved, so have the protocols for securing them. Get an overview of WLAN security standards, and learn the differences among WEP, WPA, WPA2 and WPA3. Continue Reading
-
Mobile Threat Defense (MTD)
Mobile Threat Defense (MTD) is a security software meant to protect organizations and individual users from security threats on mobile platforms. Continue Reading
-
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API. Continue Reading
Evaluate Enterprise mobile security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
4 types of mobile security models and how they work
Learn about the different mobile security models that organizations can choose from and how vendors combine cloud-based threat defense with on-device security. Continue Reading
-
Should IT consider NIAP-certified products for MDM?
The average organization may not require military-grade security for its endpoint management platform, but IT pros should take note of which products meet that standard. Continue Reading
-
Guide to work-from-home tech, IT support during the pandemic
This guide provides information on remote technologies that IT teams can quickly deploy to support employees who must work from home to prevent the spread of COVID-19. Continue Reading
Manage Enterprise mobile security
Learn to apply best practices and optimize your operations.
-
4 mobile app security threats all developers must face
Mobile apps carry their own set of code-based vulnerabilities and entry points, meaning developers need to step up their secure development, coding and deployment practices. Continue Reading
-
Learn 5 Microsoft Intune security features for mobile admins
Intune admins must be familiar with all the most essential security features that the platform offers. Learn about features such as conditional access and MTD integrations below. Continue Reading
-
Advances in enterprise mobile device security management
Learn how IT must take a holistic management approach to stop every mobile threat that comes its way with the right tools, policies and device-specific best practices. Continue Reading
Problem Solve Enterprise mobile security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Build shadow IT policy to reduce security risks
Security risks have increased during the pandemic as remote workers try to get things done. Find out how CISOs can better manage by creating a shadow IT policy. Continue Reading
-
What's the answer for 5G security?
Learn about the planning of 3GPP in developing specifications for 5G security in this synopsis of 5G Americas' white paper, 'The Evolution of Security in 5G.' Continue Reading
-
What can IT do to enhance Android security?
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the enterprise. Continue Reading