Mobile Device Management

MDM and BYOD: A square peg for a round hole

MDM and BYOD: A square peg for a round hole

While mobile device management will always be in use in the enterprise, thankfully, a better option exists.

Embracing BYOD: Mobile challenge

Embracing BYOD: Mobile challenge

By

Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network. But is that actually a good thing?

Five BYOD threats you must solve today - or risk losing your job

Five BYOD threats you must solve today - or risk losing your job

Bring-your-own-device is a hot topic and a growing trend that security professionals are going to have to face - like it or not.

SMB cloud security spending to continue growth

Small and midsize businesses will continue implementing cloud services, perhaps jumping to a quarter of all security spending by 2016, according to a soon-to-be-released report.

Symantec buys Nukona, second mobile acquisition this month

By

Security giant Symantec on Tuesday acquired Nukona, a privately held provider of mobile application management solutions, for an undisclosed amount.

Malicious Android application loots bank login data

By

Criminals are lessening their reliance on the PC. The latest proof is a rogue Android application that seeks to steal Spanish banking credentials through a man-in-the-middle-style attack.

Apple pushes security update for iPhone, iPad

By

Apple on Wednesday updated its iOS mobile operating system to rectify more than 80 vulnerabilities.

Protect data on the go

Protect data on the go

The exploding use of smart mobile devices and the business productivity that accompanies this trend has many CIOs and IT administrators reeling.

The blueprint for secure BYOD

Bring-your-own-device (BYOD) quickly made the jump from industry trend to business imperative, and organizations are now feeling the pressure to open their networks to employee-owned devices.

'Tis the season for consumerization of IT

'Tis the season for consumerization of IT

With the holidays right around the corner, expect many workers to soon be returning from their breaks with shiny new personal devices, like an iPad, in hand -- and wanting to connect them to the corporate network. IT departments must have a response plan in place.

"Significant" security threats found in Android devices

By

Android phones from leading manufacturers -- including HTC, Motorola and Samsung -- contain pre-loaded applications that do not properly enforce the platform's permission-based security model.

Twitter buys Whisper Systems for Android security

By

Twitter has acquired a start-up that makes security and management solutions for Android devices.

Video: The Android problem

By

In this interview, Harry Sverdlove, CTO of Bit9, describes to SC Magazine Executive Editor Dan Kaplan what the bring-your-own-device revolution means for organizations, and how they should best address the threat posed by endpoints such as the Android.

Video: The "Bring Your Own Device" conundrum

By

SC Magazine Executive Editor Dan Kaplan sits down with a Juniper security executive to learn why the trend of mobility and data migration should be a top concern for security professionals, and how they can institute best practices to deal with the new risk.

Sponsored video: Bryan Smoltz of Zenprise on mobile

By

Bryan Smoltz, director of business development at Zenprise, the HP Protect 2011 "Emerging Vendor" winner, describes to SC Magazine Editor-in-Chief Illena Armstrong how organizations must strike the balance between embracing mobile devices and properly managing them.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US