Endpoint September 23, 2015 iOS 9: It’s Here, Whether You Know It or Not 3 min read - When employees upgrade their devices to iOS 9 but the enterprise doesn't support the new platform, it opens organizations up to major security risks.
Data Protection September 16, 2015 Tech Travel Security: Carry-On or Checked Baggage? 3 min read - Travelers need to assess their travel security strategy to make sure they are avoiding threats that put their critical data and physical safety at risk.
Endpoint August 21, 2015 Protect the One That’s Closest to You — Your Mobile Device 2 min read - Organizations that allow employees to use a mobile device to complete business tasks need to have a strong mobile security strategy to protect data.
Endpoint August 18, 2015 RAMPing Up Mobility in the Most Secure Enterprises 2 min read - Enterprise mobility management (EMM) can help organizations of any size or structure enter the next phase of mobile security.
Endpoint July 20, 2015 Mobile Security for Unmanaged Devices 3 min read - An oft-overlooked aspect of mobile security is the risk introduced by compromised devices. When a device is at risk, the data on it is also at risk.
CISO July 6, 2015 The Declaration of Mobile Independence and Data Bill of Rights 5 min read - Can employees and enterprises come together to form a Bill of Rights for mobile device management? It may be necessary for the future of IT and security.
Endpoint June 22, 2015 IBM Named Leader in 2015 Gartner Magic Quadrant for Enterprise Mobility Management Suites 3 min read - IBM has been recognized as a Leader in Gartner's Magic Quadrant for Enterprise Mobility Management Suites report, published in June 2015.
Endpoint April 27, 2015 Data and Content Security for the Mobile-First World 3 min read - Employees and enterprises are operating in an increasingly mobile-first world. Because of this, content security is of the utmost importance to executives.
Endpoint April 23, 2015 Medicating Health Care’s Mobile Malware Maladies With Threat Management 3 min read - Labeled vulnerable to cyberattacks such as mobile malware by the FBI, health care organizations need to develop strong mobile security strategies in 2015.
Endpoint April 20, 2015 Mobile Device Management to Security: “I’m Not Dead Yet!” 3 min read - Mobile device management should not be discounted as a service since 32 percent of mobile security incidents are caused by lost devices.