Securing mobile devices and data in the enterprise
Top Stories
-
Tip
03 Mar 2022
Understanding BYOD policy enforcement and creation
A well-defined BYOD policy is critical for any organization that allows consumer devices on the network. Communicating and enforcing the BYOD policy can prevent many problems. Continue Reading
By -
Feature
07 May 2021
Compare BYOD vs. CYOD vs. COPE vs. COBO for a mobile strategy
BYOD offers companies flexibility for employee devices. COBO offers security. Neither aspect can be the only factor in a mobile device management strategy. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
- Robert Sheldon
-
Definition
11 Apr 2024
identity management (ID management)
Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to technology resources. Continue Reading
-
Definition
28 Mar 2024
sensitive information
Sensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization. Continue Reading
By- Nick Barney, Technology Writer
-
Definition
12 Oct 2023
security awareness training
Security awareness training is a strategic approach IT and security professionals take to educate employees and stakeholders on the importance of cybersecurity and data privacy. Continue Reading
By- Kinza Yasar, Technical Writer
- Mary K. Pratt
-
Definition
15 May 2023
remote wipe
Remote wipe is a security feature that allows a network administrator or device owner to send a command that remotely deletes data from a computing device. Continue Reading
By- Alexander S. Gillis, Technical Writer and Editor
- Ben Lutkevich, Site Editor
-
Definition
24 Apr 2023
enterprise mobility
Enterprise mobility is an approach to work in which employees can do their jobs from anywhere using a variety of devices and applications. Continue Reading
-
Definition
12 Apr 2023
Active Directory Federation Services (AD FS)
Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall. Continue Reading
By -
Definition
27 Feb 2023
employee productivity
Employee productivity, sometimes referred to as workforce productivity, is an assessment of the efficiency of a worker or group of workers. Continue Reading
By -
Definition
14 Apr 2022
RPC over HTTP
Remote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP. Continue Reading
By -
Tip
03 Mar 2022
Understanding BYOD policy enforcement and creation
A well-defined BYOD policy is critical for any organization that allows consumer devices on the network. Communicating and enforcing the BYOD policy can prevent many problems. Continue Reading
By -
Feature
07 May 2021
Compare BYOD vs. CYOD vs. COPE vs. COBO for a mobile strategy
BYOD offers companies flexibility for employee devices. COBO offers security. Neither aspect can be the only factor in a mobile device management strategy. Continue Reading
By- Reda Chouffani, Biz Technology Solutions
- Robert Sheldon
-
Guide
14 Aug 2019
Enterprise mobility management software offerings and use cases
IT professionals can use enterprise mobility management software to deploy mobile policies across a fleet of endpoints, so they should get to know the EMM tools in the market. Continue Reading
By- John Powers, Senior Site Editor
-
News
14 May 2015
ShareFile steps up security with third-party DLP integration
Citrix ShareFile will allow for third-party DLP integration within its data zones, as IT shops look for a balance between ease of use and security. Continue Reading
By- Alyssa Provazza, Editorial Director
-
Tip
30 Apr 2015
Five tips for managing guest wireless network access
With the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys. Continue Reading
-
Tip
30 Mar 2015
Setting standards for in-house app development and delivery
As with anything, mobile application development goes best when IT comes in with a well-thought-out plan. Learn how to optimize your app dev and delivery process. Continue Reading
-
Feature
24 Mar 2015
Create apps that focus on end-user needs first
Many companies approach mobile app development backward and don't even realize it. Prioritizing user needs over business needs will breed better results. Continue Reading
By -
Tip
06 Mar 2015
What Apple Pay tokenization means for PCI DSS compliance
Tokenization is a key technology underlying Apple Pay, promising to boost payment data security. Mike Chapple examines how Apple Pay's tokenization system works, and whether it will provide any PCI DSS compliance relief. Continue Reading
By- Mike Chapple, University of Notre Dame
-
Tip
04 Nov 2014
Why mobile user authentication is more important than ever
Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands. Continue Reading
-
Tip
25 Sep 2014
Rooted Android device risks include network access, data theft
Rooting an Android smartphone or tablet makes the device more vulnerable to malicious apps that could wreak havoc on a corporate network. MDM alone can't stop the threat. Continue Reading
-
Answer
09 Jul 2014
How does Box security help with auditing and compliance?
Box's security features help IT admins audit data access and limit the sharing of sensitive information stored in the cloud. Continue Reading
By -
Tip
19 May 2014
Comparing mobile OS security features
Security features and methods vary across the different mobile operating systems, so you should get to know who offers what. Continue Reading
By- Lisa Phifer, Core Competence
-
Feature
09 Apr 2014
Pros and cons of using secure containers for mobile device security
With BYOD on the rise, IT needs to keep sensitive corporate information safe. Secure containers are one way to do that, but when’s best to use them? Continue Reading
-
Opinion
10 Mar 2014
How mobile antivirus software works and how to know if you need it
Whether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use. Continue Reading
By -
Tip
20 Dec 2013
How to use smartphone security settings
Smartphone security settings such as passcodes, encryption and network controls can help users secure their mobile phones and protect corporate data. Continue Reading
By -
News
18 Apr 2013
Two-step verification for Microsoft accounts improves security
Microsoft will offer two-step verification for users with Microsoft accounts, extending the Microsoft Commerce security measures to protect all aspects of users' accounts. Continue Reading
— Technology Guide -
Tip
27 Mar 2013
How mobile device encryption works to protect sensitive data
Mobile device encryption -- of both the hardware and software varieties -- is one of the best ways to secure data on smartphones and tablets. Continue Reading
By- Lisa Phifer, Core Competence
-
News
21 Nov 2012
Symantec brings Norton to iOS
Symantec's Norton Mobile Security 3.0 offers a new iOS client, plus new safeguards for Android, cross-platform backup, anti-theft protection and location tracking. Continue Reading
— Brighthand -
News
25 Jul 2012
Active Directory deficient for consumerization-era identity management
As cloud and mobile take root in enterprises, identity management takes center stage and some say Active Directory isn’t enough. Continue Reading
By- James Furbush, TechTarget
-
News
20 Dec 2011
Wi-Fi hotspots in the enterprise
Portable Wi-Fi hotspots are great for users who want to get around blocks that IT puts in place, but that can cause a security nightmare. Continue Reading
— ConsumerizeIT -
News
08 Dec 2011
What IT can do about FUIT
Users want to circumvent the settings on their corporate computers, and there isn’t much IT can do to stop them. But explaining why security policies are in place might be a good place to start. Continue Reading
— ConsumerizeIT -
News
05 Dec 2011
Carrier IQ sets off security alarms
IT admins should be careful which smartphones their employees are using, because Carrier IQ is tracking millions of devices. Continue Reading
— ConsumerizeIT -
News
02 Dec 2011
HR’s role in consumerization
Most companies wrote their employee policies before the rise of consumerization. To fully embrace this shift, IT and human resources will have to work together. Continue Reading
— ConsumerizeIT -
News
30 Nov 2011
Does consumerization improve security?
The pride-of-ownership effect could keep data more secure in companies that let employees use corporate devices for personal tasks and vice versa. Continue Reading
— ConsumerizeIT -
Tip
23 Nov 2011
Android security issues in IT
Android security issues, especially around Android app security, make IT admins weary about enterprise support. But new versions address some risks. Continue Reading
— SearchConsumerization.com -
News
07 Oct 2011
Experts to IT: Focus on data, not devices
Analysts at Interop told IT pros to focus more on securing the data on users' smartphones and tablets, and less on the devices themselves. Continue Reading
— Taking Back IT -
Tip
01 Sep 2011
Creating a fluid mobile platform strategy to manage mobile diversity
A fluid mobile platform strategy helps enterprises manage the growing diversity of smart devices including tablets. Continue Reading
-
Answer
28 Feb 2011
Can smartphones get viruses and spread them to the network?
Today's powerful smartphones can sometimes spread viruses to the corporate network. Learn how it can happen and how to prevent it. Continue Reading
By -
Tip
28 Feb 2011
Mobile patching is No. 1 challenge of mobile device security
Lack of a systematic, efficient mobile patching process will likely be the biggest challenge of mobile device security. Continue Reading
-
News
21 Feb 2011
Tablet security calls for mobile policy, controlling mobile apps
Tablet PCs are taking IT departments by storm, and security is top of mind. In this Q&A with industry expert Nick Arvanitis, you'll learn the importance of having a mobile policy and how to approach tablet and mobile security from the top down. Continue Reading
By- Susan Fogarty, Senior Director
-
Tip
06 Oct 2010
How to secure GSM phones against cell phone eavesdropping
Every enterprise has mobile phones, and, due to a recent attack demonstrated by Chris Paget at Defcon, every enterprise is now open to the possibility of data theft or mobile DoS attacks. Learn more about the growing threats of cell network eavesdropping and spoofing. Continue Reading
By