CISO July 6, 2015 The Declaration of Mobile Independence and Data Bill of Rights 5 min read - Can employees and enterprises come together to form a Bill of Rights for mobile device management? It may be necessary for the future of IT and security.
Endpoint June 25, 2015 Take Your Mobile Security to the Next Level 5 min read - Enterprises today are embracing mobile technologies and the bring-your-own-device movement, but that means they must develop mobile security strategies.
Endpoint June 22, 2015 IBM Named Leader in 2015 Gartner Magic Quadrant for Enterprise Mobility Management Suites 3 min read - IBM has been recognized as a Leader in Gartner's Magic Quadrant for Enterprise Mobility Management Suites report, published in June 2015.
Endpoint May 27, 2015 Download Deluge: Managing the Mobile Data Appetite 2 min read - A dramatic rise in mobile data traffic is predicted by 2019, and businesses will have to change their security approach to keep up with the latest trends.
Endpoint April 27, 2015 Data and Content Security for the Mobile-First World 3 min read - Employees and enterprises are operating in an increasingly mobile-first world. Because of this, content security is of the utmost importance to executives.
Endpoint April 23, 2015 Medicating Health Care’s Mobile Malware Maladies With Threat Management 3 min read - Labeled vulnerable to cyberattacks such as mobile malware by the FBI, health care organizations need to develop strong mobile security strategies in 2015.
Endpoint April 20, 2015 Mobile Device Management to Security: “I’m Not Dead Yet!” 3 min read - Mobile device management should not be discounted as a service since 32 percent of mobile security incidents are caused by lost devices.
Endpoint April 13, 2015 Mobile Security Framework: How to Keep Enterprises Secure 3 min read - In order to combat potential data breaches, organizations must focus their attention on mobile security and bring-your-own-device policies.
Endpoint March 17, 2015 Android for Work Rewraps Lollipop for Business Security 3 min read - Android for Work is offering a sweeter choice than the sour taste of fragmentation when it comes to business security and device management.
Intelligence & Analytics February 9, 2015 Do We Need New Security Tools for the IoT? 3 min read - As the IoT becomes more prevalent, enterprises must improve their mobile device protection programs by strengthening their security controls.