You searched for mobile device management/ | Page 7 of 23 | SC Media

Your search for mobile device management/ returned 222 results

Your search for mobile device management/ returned 222 results

Sort Results:

Relevant Recent
Federation 2.0: An identity ecosystem
Features

Federation 2.0: An identity ecosystem

Federated identity, the process of authenticating someone across multiple IT systems and organizations, is taking on new meaning with the growth of cloud and mobile.
Keeping up the guard: Protecting credit cards
Features

Keeping up the guard: Protecting credit cards

Increased compliance and improved data-protection methods have helped ward off a major credit card breach this year. Yet plenty of holes at the merchant level still remain for a class as dedicated as criminals.
Security News

Company news

Kevin Prince has joined Perimeter Internetworking as chief security officer. Prince will help formulate the managed network security firm's strategic and product development plans and oversee its strategic relationships. Prince previously founded Red Cliff Solutions and he currently trains federal examiners on security topics such as firewalls, intrusion detection and prevention, and remote access. www.perimeterusa.com
Security News

SC Awards 2007 – Time to be counted

It's that time again to pay homage to the IT security pros, companies and products that help safeguard the corporate world from growingly sophisticated internet threats. To kick off our annual tribute, this year's SC Magazine Awards finalists are in.
Features

Tailor your mobile security plan for the iPod generation

Ever since the emergence of iPod back in 2004, GFI and other experts including Gartner analysts, Ruggero Contu and John Girard have been warning that iPods are a potential danger to the corporate network. Yet, nearly one-third of medium-sized companies remain unconcerned about leaking sensitive data through devices that are highly portable with large storage capacities, according to Osterman Research.
Sponsors

Forcepoint 2016: Top 8 Predictions

Forcepoint Security Labs mas made its top cyber security predictions for 2016. Are you prepared to take on the challenges?
Personnel check-up: Identity management
Features

Personnel check-up: Identity management

A sound approach to identification and authentication is an elementary building block to security policy within most any organization, but management of these disciplines face fresh challenges.
Next post in Features