The landscape of enterprise endpoints has shifted dramatically in the last few years, as typical endpoints have evolved from laptops to mobile devices—a shift...
Hi, what are you looking for?
The landscape of enterprise endpoints has shifted dramatically in the last few years, as typical endpoints have evolved from laptops to mobile devices—a shift...
Enterprise mobility management (EMM) has a place in today’s mobile environment, however, it is only the starting point when thinking about mobile security.
Recently I attended Gartner’s Security and Risk Management Summit outside Washington, D.C. Early in the week, I had a discussion with a security professional...
Today, the average number of mobile apps accessed daily is more than double the average number of times an employee logs into legacy systems...
As 2014 came to a close, industry experts weighed in with their predictions for 2015. A number of these predictions focused on mobile devices...
Not a week goes by that I don’t speak to an enterprise struggling with mobile security. From what to support to how to ensure...
It would be hard to look back at 2014, without discussing some of the major mobile security events that occurred. From Home Depot to...
Incidents of data breaches continue to be on the rise. The increase was so great in 2013—62 percent – that Symantec coined it the...
I recently spoke to a reporter preparing a story on California’s new smartphone “Kill Switch” law. This law requires mobile devices sold in California...
Corporate-owned device fleets have been the norm since mobile was introduced into the enterprise. Today, a number of organizations continue this tradition, only now...
We know mobile is quickly changing the way we do business and now it’s also beginning to replace the web.
These days the mobile fleet in most organization breaks down into three categories: corporate-owned devices, shared corporate-owned devices (tablets for events, point of sale,...