Securing mobile devices and data in the enterprise
Top Stories
- 
				Tip
					03 Mar 2022
					
									
										  Understanding BYOD policy enforcement and creationA well-defined BYOD policy is critical for any organization that allows consumer devices on the network. Communicating and enforcing the BYOD policy can prevent many problems. Continue Reading By
- 
				Feature
					07 May 2021
					
									
										  Compare BYOD vs. CYOD vs. COPE vs. COBO for a mobile strategyBYOD offers companies flexibility for employee devices. COBO offers security. Neither aspect can be the only factor in a mobile device management strategy. Continue Reading By- Reda Chouffani, Biz Technology Solutions
- Robert Sheldon
 
- 
                Definition
                11 Apr 2024
                  identity management (ID management)Identity management (ID management) is the organizational process for ensuring individuals have the appropriate access to technology resources. Continue Reading 
- 
                Definition
                28 Mar 2024
                  sensitive informationSensitive information is data that must be protected from unauthorized access to safeguard the privacy or security of an individual or organization. Continue Reading By- Nick Barney, Technology Writer
 
- 
                Definition
                12 Oct 2023
                  security awareness trainingSecurity awareness training is a strategic approach IT and security professionals take to educate employees and stakeholders on the importance of cybersecurity and data privacy. Continue Reading By- Kinza Yasar, Technical Writer
- Mary K. Pratt
 
- 
                Definition
                15 May 2023
                  remote wipeRemote wipe is a security feature that allows a network administrator or device owner to send a command that remotely deletes data from a computing device. Continue Reading By- Alexander S. Gillis, Technical Writer and Editor
- Ben Lutkevich, Site Editor
 
- 
                Definition
                24 Apr 2023
                  enterprise mobilityEnterprise mobility is an approach to work in which employees can do their jobs from anywhere using a variety of devices and applications. Continue Reading 
- 
                Definition
                12 Apr 2023
                  Active Directory Federation Services (AD FS)Active Directory Federation Services (AD FS) is a feature of the Windows Server operating system (OS) that extends end users' single sign-on (SSO) access to applications and systems outside the corporate firewall. Continue Reading By
- 
                Definition
                27 Feb 2023
                  employee productivityEmployee productivity, sometimes referred to as workforce productivity, is an assessment of the efficiency of a worker or group of workers. Continue Reading By
- 
                Definition
                14 Apr 2022
                  RPC over HTTPRemote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP. Continue Reading By
- 
                Tip
                03 Mar 2022
                  Understanding BYOD policy enforcement and creationA well-defined BYOD policy is critical for any organization that allows consumer devices on the network. Communicating and enforcing the BYOD policy can prevent many problems. Continue Reading By
- 
                Feature
                07 May 2021
                  Compare BYOD vs. CYOD vs. COPE vs. COBO for a mobile strategyBYOD offers companies flexibility for employee devices. COBO offers security. Neither aspect can be the only factor in a mobile device management strategy. Continue Reading By- Reda Chouffani, Biz Technology Solutions
- Robert Sheldon
 
- 
                Guide
                14 Aug 2019
                  Enterprise mobility management software offerings and use casesIT professionals can use enterprise mobility management software to deploy mobile policies across a fleet of endpoints, so they should get to know the EMM tools in the market. Continue Reading By- John Powers, Senior Site Editor
 
- 
                News
                14 May 2015
                  ShareFile steps up security with third-party DLP integrationCitrix ShareFile will allow for third-party DLP integration within its data zones, as IT shops look for a balance between ease of use and security. Continue Reading By- Alyssa Provazza, Editorial Director
 
- 
                Tip
                30 Apr 2015
                  Five tips for managing guest wireless network accessWith the proliferation of mobile devices, guest access to enterprise networks is more common. IT can maintain security with tools such as identity management and per-session security keys. Continue Reading 
- 
                Tip
                30 Mar 2015
                  Setting standards for in-house app development and deliveryAs with anything, mobile application development goes best when IT comes in with a well-thought-out plan. Learn how to optimize your app dev and delivery process. Continue Reading 
- 
                Feature
                24 Mar 2015
                  Create apps that focus on end-user needs firstMany companies approach mobile app development backward and don't even realize it. Prioritizing user needs over business needs will breed better results. Continue Reading By
- 
                Tip
                06 Mar 2015
                  What Apple Pay tokenization means for PCI DSS complianceTokenization is a key technology underlying Apple Pay, promising to boost payment data security. Mike Chapple examines how Apple Pay's tokenization system works, and whether it will provide any PCI DSS compliance relief. Continue Reading By- Mike Chapple, University of Notre Dame
 
- 
                Tip
                04 Nov 2014
                  Why mobile user authentication is more important than everEncrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands. Continue Reading 
- 
                Tip
                25 Sep 2014
                  Rooted Android device risks include network access, data theftRooting an Android smartphone or tablet makes the device more vulnerable to malicious apps that could wreak havoc on a corporate network. MDM alone can't stop the threat. Continue Reading 
- 
                Answer
                09 Jul 2014
                  How does Box security help with auditing and compliance?Box's security features help IT admins audit data access and limit the sharing of sensitive information stored in the cloud. Continue Reading By
- 
                Tip
                19 May 2014
                  Comparing mobile OS security featuresSecurity features and methods vary across the different mobile operating systems, so you should get to know who offers what. Continue Reading By- Lisa Phifer, Core Competence
 
- 
                Feature
                09 Apr 2014
                  Pros and cons of using secure containers for mobile device securityWith BYOD on the rise, IT needs to keep sensitive corporate information safe. Secure containers are one way to do that, but when’s best to use them? Continue Reading 
- 
                Opinion
                10 Mar 2014
                  How mobile antivirus software works and how to know if you need itWhether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use. Continue Reading By
- 
                Tip
                20 Dec 2013
                  How to use smartphone security settingsSmartphone security settings such as passcodes, encryption and network controls can help users secure their mobile phones and protect corporate data. Continue Reading By
- 
                News
                18 Apr 2013
                  Two-step verification for Microsoft accounts improves securityMicrosoft will offer two-step verification for users with Microsoft accounts, extending the Microsoft Commerce security measures to protect all aspects of users' accounts. Continue Reading - 
                Tip
                27 Mar 2013
                  How mobile device encryption works to protect sensitive dataMobile device encryption -- of both the hardware and software varieties -- is one of the best ways to secure data on smartphones and tablets. Continue Reading By- Lisa Phifer, Core Competence
 
- 
                News
                21 Nov 2012
                  Symantec brings Norton to iOSSymantec's Norton Mobile Security 3.0 offers a new iOS client, plus new safeguards for Android, cross-platform backup, anti-theft protection and location tracking. Continue Reading - 
                News
                25 Jul 2012
                  Active Directory deficient for consumerization-era identity managementAs cloud and mobile take root in enterprises, identity management takes center stage and some say Active Directory isn’t enough. Continue Reading By- James Furbush, TechTarget
 
- 
                News
                20 Dec 2011
                  Wi-Fi hotspots in the enterprisePortable Wi-Fi hotspots are great for users who want to get around blocks that IT puts in place, but that can cause a security nightmare. Continue Reading - 
                News
                08 Dec 2011
                  What IT can do about FUITUsers want to circumvent the settings on their corporate computers, and there isn’t much IT can do to stop them. But explaining why security policies are in place might be a good place to start. Continue Reading - 
                News
                05 Dec 2011
                  Carrier IQ sets off security alarmsIT admins should be careful which smartphones their employees are using, because Carrier IQ is tracking millions of devices. Continue Reading - 
                News
                02 Dec 2011
                  HR’s role in consumerizationMost companies wrote their employee policies before the rise of consumerization. To fully embrace this shift, IT and human resources will have to work together. Continue Reading - 
                News
                30 Nov 2011
                  Does consumerization improve security?The pride-of-ownership effect could keep data more secure in companies that let employees use corporate devices for personal tasks and vice versa. Continue Reading - 
                Tip
                23 Nov 2011
                  Android security issues in ITAndroid security issues, especially around Android app security, make IT admins weary about enterprise support. But new versions address some risks. Continue Reading - 
                News
                07 Oct 2011
                  Experts to IT: Focus on data, not devicesAnalysts at Interop told IT pros to focus more on securing the data on users' smartphones and tablets, and less on the devices themselves. Continue Reading - 
                Tip
                01 Sep 2011
                  Creating a fluid mobile platform strategy to manage mobile diversityA fluid mobile platform strategy helps enterprises manage the growing diversity of smart devices including tablets. Continue Reading 
- 
                Answer
                28 Feb 2011
                  Can smartphones get viruses and spread them to the network?Today's powerful smartphones can sometimes spread viruses to the corporate network. Learn how it can happen and how to prevent it. Continue Reading By
- 
                Tip
                28 Feb 2011
                  Mobile patching is No. 1 challenge of mobile device securityLack of a systematic, efficient mobile patching process will likely be the biggest challenge of mobile device security. Continue Reading 
- 
                News
                21 Feb 2011
                  Tablet security calls for mobile policy, controlling mobile appsTablet PCs are taking IT departments by storm, and security is top of mind. In this Q&A with industry expert Nick Arvanitis, you'll learn the importance of having a mobile policy and how to approach tablet and mobile security from the top down. Continue Reading By- Susan Fogarty, Senior Director
 
- 
                Tip
                06 Oct 2010
                  How to secure GSM phones against cell phone eavesdroppingEvery enterprise has mobile phones, and, due to a recent attack demonstrated by Chris Paget at Defcon, every enterprise is now open to the possibility of data theft or mobile DoS attacks. Learn more about the growing threats of cell network eavesdropping and spoofing. Continue Reading By