Mobile Device Management
While mobile device management will always be in use in the enterprise, thankfully, a better option exists.
Businesses may no longer be able to turn away employees who want to bring their smartphones and tablets to work, and connect to the corporate network. But is that actually a good thing?
Bring-your-own-device is a hot topic and a growing trend that security professionals are going to have to face - like it or not.
Small and midsize businesses will continue implementing cloud services, perhaps jumping to a quarter of all security spending by 2016, according to a soon-to-be-released report.
Security giant Symantec on Tuesday acquired Nukona, a privately held provider of mobile application management solutions, for an undisclosed amount.
Criminals are lessening their reliance on the PC. The latest proof is a rogue Android application that seeks to steal Spanish banking credentials through a man-in-the-middle-style attack.
Apple on Wednesday updated its iOS mobile operating system to rectify more than 80 vulnerabilities.
The exploding use of smart mobile devices and the business productivity that accompanies this trend has many CIOs and IT administrators reeling.
Bring-your-own-device (BYOD) quickly made the jump from industry trend to business imperative, and organizations are now feeling the pressure to open their networks to employee-owned devices.
With the holidays right around the corner, expect many workers to soon be returning from their breaks with shiny new personal devices, like an iPad, in hand -- and wanting to connect them to the corporate network. IT departments must have a response plan in place.
Android phones from leading manufacturers -- including HTC, Motorola and Samsung -- contain pre-loaded applications that do not properly enforce the platform's permission-based security model.
Twitter has acquired a start-up that makes security and management solutions for Android devices.
In this interview, Harry Sverdlove, CTO of Bit9, describes to SC Magazine Executive Editor Dan Kaplan what the bring-your-own-device revolution means for organizations, and how they should best address the threat posed by endpoints such as the Android.
SC Magazine Executive Editor Dan Kaplan sits down with a Juniper security executive to learn why the trend of mobility and data migration should be a top concern for security professionals, and how they can institute best practices to deal with the new risk.
Bryan Smoltz, director of business development at Zenprise, the HP Protect 2011 "Emerging Vendor" winner, describes to SC Magazine Editor-in-Chief Illena Armstrong how organizations must strike the balance between embracing mobile devices and properly managing them.
Sign up to our newsletters
SC Magazine Articles
- Impact of Linux bug 'grinch' spans servers, workstations, Android devices and more
- House, in rush vote, passes Intelligence Authorization Act
- More than 100K WordPress sites compromised by malware due to plugin vulnerability
- Phishing email contains Word doc, enabling macros leads to malware infection
- U.S. accounts for most Mac OS X attacks and websites seeded with malware
- White House calls Sony hack a "serious national security matter," gov't mulls proper response
- 'Spark' shares traits with Alina, JackPOS, uses AutoIt differently
- California nonprofit sues San Diego Police Department over stingray documents
- Critical 'Misfortune Cookie' bug puts millions of internet-connected routers at risk
- Securing the enterprise with the five W's of access