Mobile data protection and authentication software

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Regain control with a secure file-sharing system

    As users store increasing amounts of data to the cloud, enterprise IT must develop strong policies and procedures for guaranteeing access and security. Administrators can consider cloud-based, on-premises and hybrid file-sharing systems. Admins shoul... 

  • Setting cloud service usage policies for employees

    Cloud services are still a lawless frontier for many organizations. As with the consumerization of IT, companies need to first determine what is best for their purposes and then inform users of their data security policies. We also take a look at too... 

  • Corporate data in the consumer cloud

    Consumerization trends are having a massive effect on enterprise IT. As end users turn to easy-to use, cloud-based services such as Dropbox and Gmail, which are out of IT's control, they are putting pressure on corporate IT to provide more flexible a... 

  • Data loss prevention strategies in the cloud era

    Privacy regulations and concerns about leaks of sensitive information have raised the priority of data loss prevention as enterprises adopt cloud and mobile computing. Not only must IT craft business rules and tag critical data, but it must also invo... 

  • Apple Touch ID

    Apple Touch ID is biometric technology that provides iOS user identification through a finger scanner. 

  • time-based one-time password (TOTP)

    A time-based one-time password (TOTP) is a temporary code, generated by an algorithm, for use in authenticating access to computer systems. 

  • mobile content management

    Mobile content management (MCM) is set of technologies that provide secure access to corporate data on smartphones, tablets and other endpoint devices. 

  • identity management (ID management)

    Identity management (ID management) is a broad administrative area that deals with identifying individuals in a system (such as a country, a network, or an enterprise) and controlling their access to resources within that system by associating user r... 

  • context-aware security

    Context-aware security is the use of situational information (such as identity, location, time of day or type of endpoint device) to improve information security decisions. 

  • remote wipe

    Remote wipe is a security feature that allows a network administrator or device owner to send a command to a computing device and delete data.  

  • Lookout Mobile Security

    Lookout Mobile Security is an antimalware, data backup and remote management app for smartphones and tablets. 

  • Active Directory Federation Services (AD Federation Services)

    Active Directory Federation Services (AD Federation Services) is a feature of the Windows Server operating system that extends end users' single sign-on access to applications and systems outside the corporate firewall. 

  • evil maid attack

    An evil maid attack is a security exploit that targets a computing device that has been shut down and left unattended.  An evil maid attack is characterized by the attacker's ability to physically access the target multiple times without the owner's ... 

  • mobile information management (MIM)

    Mobile information management (MIM) is a device-agnostic security strategy that involves keeping sensitive data encrypted and allowing only approved applications to access or transmit it. 

  • See more Definitions on Mobile data protection and authentication software
About Mobile data protection and authentication software

Mobile data protection involves protecting data on mobile devices from both internal and external threats. In the era of consumerization, IT pros need mobile data protection to keep corporate information safe regardless of where it lives -- in the data center, on company-owned PCs or on personal smartphones and tablets. Organizations also need to implement data protection policies that cover theft and loss, as well as keep track of who owns devices, what acceptable usage is and what support is provided when problems arise. Mobile device authentication software can also help to control information sharing and remote access. By providing passcode, smart card and certificate management, device authentication software ensures secure access on mobile devices. Users should be aware of the mobile data protection and device authentication software that controls their device, so they can report data loss and recover personal information when threats arise.