This installment of SearchSecurity.com's special news series, "Eye On" explores how enterprise information security teams can address the risks posed by the proliferation of smartphone and tablet device use by employees.
While some firms issue company-owned devices, others are dealing with how to adequately control employee-owned mobile devices. Security pros are seeking to understand the various mobile phone security threats and then apply and enforce security technology and policy to reduce the risk of data leakage. Among the technologies available to help with mobile security is mobile device management or MDM, which seeks to help enterprises apply mobile security policies across different device platforms. Cloud-based mobile security services are also emerging to address the risks. This series explores all these themes.
In this part:
Top mobile phone security threats
With the right attack, cybercriminals can access corporate data and emails containing that corporate data via a mobile device. Read about how you can stay on top of the emerging threats against the mobile phones used in your organization.
Mobile device management
Read about some of the options available in mobile device management products that can help security managers get a grip on enterprise mobile device security.
Security SaaS for smart devices
Read how you can use these cloud-based mobile security services to fend off malware and protect sensitive data.
Tablet security issues
Learn to see if your anxiety over tablet security is misplaced.
Learn how security pros in India are coping with BYOD security.