You searched for mobile device management/ | SC Media

Your search for mobile device management/ returned 9 results

Active Filters

Click on a filter below to refine your search. Remove a filter to broaden your search.

Last 30 days remove

Your search for mobile device management/ returned 9 results

Sort Results:

Relevant Recent
First Look, Reviews, Security News

First Look: Secure Data’s SecureDrive BT

Company Name: Secure Data Product Name: SecureDrive BT Basic Price: $250-$3,700 for 250GB to 8TB SSP What it does: A hardware encrypted storage device that unlocks wirelessly with a mobile device via Bluetooth. What we liked: The remote management-ready capability allows for total control over every aspect of the drive no matter where it’s located…
Product Review

BlackBerry Spark

BlackBerry Spark operates an an endpoint-centric and prevention-focused security suite. It offers a range of security capabilities and visibility to protect people, devices, networks, and apps, while its AI-backed malware and threat detection stops malicious processes before they execute. The BlackBerry Spark suite consists of three modules: BlackBerry Protect, BlackBerry Protect for Mobile, and Blackberry…
Product Review

BlackBerry Spark

BlackBerry Spark operates as an endpoint-centric and prevention-focused security suite. It offers a range of security capabilities and visibility to protect people, devices, networks, and apps, while its AI-backed malware and threat detection stops malicious processes before they execute. The BlackBerry Spark suite consists of three modules: BlackBerry Protect, BlackBerry Protect for Mobile, and Blackberry…
Malware, Mobile Security, Privacy & Compliance News and Analysis, Security News

Glupteba malware leverages blockchain as a communications channel

Glupteba malware does something novel: It uses the bitcoin blockchain as a communications channel to receive updated configuration information. That’s important because malware always needs a way to go back to its home base, preferably without being detected, according to a paper released this week by Sophos Labs researchers. The new form of malware sprinkles…
IoT, Privacy & Compliance News and Analysis, Security News

Are your fleet’s vehicles leaking your data secrets?

Enterprise CISOs are used to worrying about corporate data leaks via typical mobile, remote locations, IoT and Shadow IT. But what about the vehicles used by so many people who have access to the systems and data you are paid to protect? Although those vehicles technically fall into many of those categories (mobile, remote and…
Executive Insight, Opinion

5 IoT Security Tips for Stay-At-Home Workers

As millions of employees across the world work from home because of the COVID-19 pandemic, IoT security has become more critical than ever as cybercriminals look to exploit the situation. Over the past few years, many organizations already have put security controls and measures in place that ensure only authorized users can access and configure…
Product Review

F-Secure Protection Service for Business, Computer Protection Premium 20.1

F-Secure Protection Service for Business, Computer Protection Premium operates as a cloud-native solution that saves analysts time in deploying, managing and monitoring security because of its integrated patch management, layered protection and advanced behavior and heuristic analysis. It delivers effective and consistent protection for all endpoints. With its cloud-native platform and third-party system integrations, F-Secure…
Hackers for Charity
Application Security, Database security, Security News, Web Services Security, E-Commerce Security

Exposed dating service databases leak sensitive info on romance-seekers

A series of database misconfigurations publicly exposed the personal information and private messages of more than 100 million dating website and mobile app account holders. Independent VPN review site WizCase has reported finding six separate dating sites or apps that each potentially compromised thousands of users due to improper data storage. According to WizCase researchers,…
InfoSec World 2020, Security News

Digital disruption grows attack surface, Edelman Financial Engines’ Conlon says

Staying one step ahead of attackers by eliminating vulnerabilities before they’re detected is the obvious goal of any enterprise. How to shore up your infrastructure and IT operations with state-of-the-art defense and efficiency should be on any infosec team’s to-do list, and what follows are various best practices to help you with your network security…
Next post in Security News