You searched for mobile device management/ | Page 5 of 23 | SC Media

Your search for mobile device management/ returned 222 results

Your search for mobile device management/ returned 222 results

Sort Results:

Relevant Recent
Security News

The seven sins of copier security are revealed…

The networked copier that all companies have in the hallway or backroom is no longer the “old school” device most IT managers still assume it to be. On the contrary, it’s quickly evolved into a sophisticated computing platform that can grant access into the heart of the network. Copiers have been reborn as document distribution…
Features

Mobile security dialing up investment dollars

The mobile, wireless world in which we now live has created a shift in the focus of venture capital investments in security technology. Today's investors tend to target technology that directly protects people and information, a marked change from a few years ago when the focus was the protection of corporate computer systems as a whole.
Safe tether: Wearables
Features

Safe tether: Wearables

Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.
Security News

New gadgets, new rules

The growth of mobile messaging devices means firms need to update usage policies, advises Gunter Ollmann
Features

Vista validates encryption for mobile and endpoint security

Long viewed as a major vector for incoming threats such as viruses, malware and worms, organizations are also increasingly viewing laptops as a primary weakness in the fight against the theft, loss and misuse of information. The trouble with mobile devices is they make your data mobile too, which is the last thing you want for data security. Every night critical, sensitive data leaves the confines of an organization, crossing the firewall and network defenses on the hard drives of laptops stashed in briefcases.
Next post in Reboot 2012