You searched for mobile device management/ | SC Media

Your search for mobile device management/ returned 14 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 12 months remove
Mobile Security remove

Your search for mobile device management/ returned 14 results

Sort Results:

Relevant Recent
Reviews, Security News

SC Labs’ Product Reviews: Mobile device management and unified endpoint management

Mobile device management is a crucial component of maintaining a stable security posture, but mobile device management and unified endpoint management tools, one of the more difficult areas of cybersecurity is one of the most difficult areas of cybersecurity. The everchanging and growing threat landscape makes security difficult enough, while the lack of control surrounding…
Product Review

Hexnode 8.2

Hexnode offers enterprise-wide endpoint management for both personal and corporate-owned devices, all on a single console. This product comes with a variety of customizations and top-of-the-line support. Hexnode is sleek and, overall, well organized. The dashboard layout shows a high-level overview of device and user information. Unfortunately, it has no widget configuration capability that would…
Product Review

Sophos Mobile 9.0

The Sophos Mobile Device Management platform (which may shortly be rebranded as InterceptX for mobile) is a native endpoint security solution that integrates with third-party solutions to reduce time and effort spent on managing traditional and mobile endpoints without inhibiting productivity. We initially struggled to set up this site. Eventually, we had to open a…
Cybercrime, Mobile Security, Network Security, Security News

Banking trojan attack exposes dangers of not securing MDM solutions

A global conglomerate had 75 percent of its mobile devices infected by a variant of the Cerberus Android banking trojan after an attack compromised the company’s mobile device management (MDM) server and used it to spread the malware. In a company blog post report, Check Point Software Technologies identifies MDM as a fairly novel malware…
Product Review

MobileIron UEM R64

MobileIron UEM secures modern device platforms with zero sign-on, multi-factor authentication (MFA) and mobile threat detection. The product aggregates device and application information in a single pane of glass for easy provisioning, configuration and management across the entire deployment lifecycle. MobileIron UEM always verifies devices, applications, users and networks. This “never trust, always verify” approach…
Data Breach, Security News

2020 Predictions: Data Breaches

Experian predictionsCybercriminals will leverage text-based “smishing” identity theft techniques to target consumers participating in online communities. As more Americans continue to join like-minded groups on social media to provide financial support to social causes or political candidates, cybercriminals can solicit unsuspecting consumers with fraudulent messages via SMS text to seek bank account details or other…
Mobile Security, Security News, Vulnerabilities

StrandHogg 2.0 bug enables Android app hijacking, poses patching challenge

A critical elevation-of-privilege vulnerability found in Android devices could potentially be exploited, without root access or user permission, to hijack virtually all mobile apps in order to spy on individuals or steal their login credentials. Google has developed a security patch for Android versions 8, 8.1 and 9 — alerting its partners of the update…
Cybercrime, Data Breach, Mobile Security, Security News

20M Aptoide accounts exposed by leak on hacker forum

More than 20 million accounts registered with the software marketplace application Aptoide have been reportedly exposed after a unknown actor posted stolen user data on a hacking forum. Researchers with Under the Breach discovered the data dump and disclosed the incident via Twitter. ZDNet reported additional details the same day. Aptoide is a blockchain-based decentralized…
Government, Government/Defense, Mobile Security, Privacy & Compliance News and Analysis, Security News

Is TikTok out of time? Experts mull implications of ban

Edicts by Wells Fargo, India and the U.S. military forbidding use of popular Chinese video-sharing app TikTok, may portend a national ban and raise questions if such a prohibition would be practical and enforceable, and what the greater implications would be. Owned by Beijing-based internet technology company ByteDance, TikTok has been downloaded more than 2…
Product Review

BlackBerry Unified Endpoint Management Q-Series

BlackBerry UEM monitors mobile devices via a single management console using a trusted end-to-end security model to reduce risks and meet regulatory compliance requirements without compromising productivity. BlackBerry has clearly prioritized security in this version, evident in the addition of iOS and Android patch management. BlackBerry Work is an application that provides secure access to…
Next hm-product-review in Reviews