Email Alerts
-
Examining Kindle Fire security, Silk browser security in the enterprise
Do Kindle Fire security issues, combined with weak Silk browser security, make the red-hot consumer device too risky for enterprises? Michael Cobb explains. Tip
-
How to set up your own secure enterprise Android app store
Reduce the risk posed by smartphones and mobile applications by setting up a corporate app store for users that helps ensure Android application security. Tip
-
Managed mobility services: Benefits of MDM in the cloud
Mike Chapple on dealing with the mobile device management market and what MMS can do to benefit an organization. Tip
-
Enterprise mobile access: Considerations for two-factor mobile authentication
Is two-factor mobile authentication the only answer to secure enterprise mobile access? Randall Gamby explores keeping mobile access under control. Tip
-
Exploring Google Chromebook security for the enterprise
The Chromebook is unique among new entrants in the mobile device arena. Mike Cobb breaks down the key Google Chromebook security issues enterprises need to know. Tip
-
Android security settings and controls for Android enterprise security
Can Androids ever be secure enough for corporate use? Learn about Android security controls to enable effective Android enterprise security. Tip
-
How to write an effective enterprise mobile device security policy
Expert Lisa Phifer explains the process for creating a winning enterprise mobile device security policy that reduces the risk of mobile data threats. Tip
-
Mitigating security risks of mobile location-based services technology
What can enterprises do to mitigate the security risk of mobile location-based services technology and the like? Start by limiting smartphone apps. Tip
-
Understanding iPad security concerns for better iPad enterprise management
Are iPad security concerns burdening your company’s adoption of the technology? Expert Michael Cobb discusses common security concerns and iPad enterprise management issues. Tip
-
Top 5 mobile data protection best practices
In this tip, we highlight five essential best practices for protecting business data stored on mobile devices and tablets, and identify readily available technologies that can be used to implement them. Tip
Security Management Strategies for the CIO