You searched for mobile device management/ | SC Media

Your search for mobile device management/ returned 70 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 12 months remove

Your search for mobile device management/ returned 70 results

Sort Results:

Relevant Recent
Reviews, Security News

SC Labs’ Product Reviews: Mobile device management and unified endpoint management

Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management tools, one of the more difficult areas of cybersecurity is one of the most difficult areas of cybersecurity. The everchanging and growing threat landscape makes security difficult enough, while the lack of control surrounding…
Product Review

Hexnode 8.2

Hexnode offers enterprise-wide endpoint management for both personal and corporate-owned devices, all on a single console. This product comes with a variety of customizations and top-of-the-line support. Hexnode is sleek and, overall, well organized. The dashboard layout shows a high-level overview of device and user information. Unfortunately, it has no widget configuration capability that would…
Product Review

Sophos Mobile 9.0

The Sophos Mobile Device Management platform (which may shortly be rebranded as InterceptX for mobile) is a native endpoint security solution that integrates with third-party solutions to reduce time and effort spent on managing traditional and mobile endpoints without inhibiting productivity. We initially struggled to set up this site. Eventually, we had to open a…
Cybercrime, Mobile Security, Network Security, Security News

Banking trojan attack exposes dangers of not securing MDM solutions

A global conglomerate had 75 percent of its mobile devices infected by a variant of the Cerberus Android banking trojan after an attack compromised the company’s mobile device management (MDM) server and used it to spread the malware. In a company blog post report, Check Point Software Technologies identifies MDM as a fairly novel malware…
Editorial, Mobile Security, SC Security Ops Center, Security News

Handcuffing the mobile octopus

MDM strategies: An embarrassment of niches It is Christmas Day at 2 a.m. and a new mobile device just connected to your network. Your servers are configured to send a text message to alert you when new devices connect, so you immediately know that something has happened. But you have no policy that requires that…
Executive Insight, Opinion, Security News

Mobile Device Security for Blue Collar Workers

From blue-collar to new-collar When we picture the typical technology worker, many of us naturally think of an office worker who spends most of their day chained to a desk, sitting in a home office or getting WiFi at a Starbucks. But that view of the tech worker is increasingly too limited. These days, with…
Executive Insight, Opinion

Security perimeters in the cloud aren’t dead—They’re ephemeral

It goes without saying that companies migrating IT systems and operations to the cloud face a growing number of challenges related to security. From securing cloud-native applications in a continuous release environment to managing digital identity and remote access to sensitive data, virtually every aspect of day-to-day IT and cybersecurity operations is changing rapidly.  With…
Product Review

MobileIron UEM R64

MobileIron UEM secures modern device platforms with zero sign-on, multi-factor authentication (MFA) and mobile threat detection. The product aggregates device and application information in a single pane of glass for easy provisioning, configuration and management across the entire deployment lifecycle. MobileIron UEM always verifies devices, applications, users and networks. This “never trust, always verify” approach…
Coronavirus

Cure worse than disease? Patching riskier under COVID-19 work-from-home policies

Patch management was challenging enough before the world was upended by a rapidly spreading pandemic. But with security teams working remotely, and employee-operated devices dispersed across large distances, quickly prioritizing and fixing critical vulnerabilities has become both more difficult and more important. As the 2017 Equifax breach showed, delays in patching can result in a…
WebCast

Digital transformation as risk management

Marketers call it “digital transformation.” Really it is just another component of risk management, but this time it focuses on such technologies as AI, cloud and fog computing, mobile devices, and the internet of things.
Next hm-webcast in Webcasts