You searched for mobile device management/ | SC Media

Your search for mobile device management/ returned 66 results

Your search for mobile device management/ returned 66 results

Sort Results:

Relevant Recent
Reviews, Security News

SC Labs’ Product Reviews: Mobile device management and unified endpoint management

Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management tools, one of the more difficult areas of cybersecurity is one of the most difficult areas of cybersecurity. The everchanging and growing threat landscape makes security difficult enough, while the lack of control surrounding…
Product Review

Hexnode 8.2

Hexnode offers enterprise-wide endpoint management for both personal and corporate-owned devices, all on a single console. This product comes with a variety of customizations and top-of-the-line support. Hexnode is sleek and, overall, well organized. The dashboard layout shows a high-level overview of device and user information. Unfortunately, it has no widget configuration capability that would…
Product Review

Sophos Mobile 9.0

The Sophos Mobile Device Management platform (which may shortly be rebranded as InterceptX for mobile) is a native endpoint security solution that integrates with third-party solutions to reduce time and effort spent on managing traditional and mobile endpoints without inhibiting productivity. We initially struggled to set up this site. Eventually, we had to open a…
Cybercrime, Mobile Security, Network Security, Security News

Banking trojan attack exposes dangers of not securing MDM solutions

A global conglomerate had 75 percent of its mobile devices infected by a variant of the Cerberus Android banking trojan after an attack compromised the company’s mobile device management (MDM) server and used it to spread the malware. In a company blog post report, Check Point Software Technologies identifies MDM as a fairly novel malware…
APTs/cyberespionage, Cloud Security, Coronavirus, Phishing, Security News

COVID-19 accounts for most 2020 cyberattacks

The pandemic has served as a catalyst for much of the hacking increases during the first half of 2020, with weekly COVID-19-related phishing attacks growing from under 5,000 in February to more than 200,000 in late April. All types of cyberattacks were up 34 percent from March to April, according to Check Point’s mid-year report.…
Coronavirus, Data Breach, Phishing, Privacy & Compliance News and Analysis, Security News

Corporate VPNs in danger as vishing attacks target home workers

Multiple hacking gangs are preying on remote workforces and corporate VPNs through vishing attacks that are more efficient, dangerous and ubiquitous than ever, prompting the U.S. government to issue both a warning and advice on how to thwart them. “The news has spread throughout the hacker community and multiple groups are now doing this,” said…
Executive Insight, Opinion

Security perimeters in the cloud aren’t dead—They’re ephemeral

It goes without saying that companies migrating IT systems and operations to the cloud face a growing number of challenges related to security. From securing cloud-native applications in a continuous release environment to managing digital identity and remote access to sensitive data, virtually every aspect of day-to-day IT and cybersecurity operations is changing rapidly.  With…
Product Review

MobileIron UEM R64

MobileIron UEM secures modern device platforms with zero sign-on, multi-factor authentication (MFA) and mobile threat detection. The product aggregates device and application information in a single pane of glass for easy provisioning, configuration and management across the entire deployment lifecycle. MobileIron UEM always verifies devices, applications, users and networks. This “never trust, always verify” approach…
Coronavirus

Cure worse than disease? Patching riskier under COVID-19 work-from-home policies

Patch management was challenging enough before the world was upended by a rapidly spreading pandemic. But with security teams working remotely, and employee-operated devices dispersed across large distances, quickly prioritizing and fixing critical vulnerabilities has become both more difficult and more important. As the 2017 Equifax breach showed, delays in patching can result in a…
Perspectives

How COVID-19 pushed companies towards a mobile security strategy

At the start of 2020, many organizations were already focused on protecting their mobile employees – whether they were business travelers or the occasional employee working from home. COVID-19 changed the game. Entire workforces have been forced to work remotely. Many had already made the transition to only using smartphones and tablets for work. Others…
Next post in Perspectives