Mobile security

Share this article:
Mobile security
Mobile security
While the proliferation of mobile devices has certainly increased productivity in the workplace, it is one of the gravest security challenges facing organizations. Consumers are taking to smartphones and tablet computers – with their intuitive, user-friendly access to the internet and other services – as fast as manufacturers can produce them. Employees, especially younger workers, increasingly want to use these devices for business applications as well. Unfortunately, research indicates that the attitude toward security of most of those using so-called BYOD (bring-your-own-device) is lax.

This newest ebook from SC Magazine gathers expertise from a number of security pros in the mobile arena to help explain the latest threats facing the enterprise from this evolving paradigm, and what can be done to ensure best practices are in place to both enhance user experience and protect the integrity of corporate assets.

Click here to download this ebook on mobile security.
Share this article:
You must be a registered member of SC Magazine to post a comment.

Sign up to our newsletters

POLL

More in Research

2014 audit and compliance ebook

2014 audit and compliance ebook

We explore the landscape today with which security teams must contend and compile a number of best practices and strategies you can apply to protect your company.

2014 eBook on Encryption

2014 eBook on Encryption

The experts we spoke to for this new ebook agree that when deciding what data must be encrypted, it's a question of classifying it by level of importance.

PCI 2014: From compliance to security

PCI 2014: From compliance to security

The consensus from our panel of experts is that PCI DSS should be just one item on a far broader effort to integrate data security into enterprise risk management.