Mobile apps

Mobile apps News

View All News

Mobile apps Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Mobile apps Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

View All Evaluate

Manage Mobile apps

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Mobile apps Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Google's Adrian Ludwig talks about fighting Android threats

    Google is fighting a constant battle against Android malware and vulnerabilities, and Adrian Ludwig, Google's lead for Android security, talks to SearchSecurity about how protections are getting better. Continue Reading

  • New boundaries: Four strategies for perimeter network security

    Perimeter network security at most organizations has evolved beyond "four walls." Many of today's data centers are no longer on-premises. As cloud and mobile technologies extend the reach of network infrastructure, the notion of a network edge that relies on endpoint security no longer makes much sense. New network security models are required to define the network perimeter and how it can be defended. In this issue of Information Security, we look at four enterprise strategies for perimeter network defense, as companies move beyond traditional firewalls and network access control systems. Is the concept of the perimeter network dead, or is it simply being redefined as enterprises face new security challenges in the cloud and mobile era?

    The API economy has swept across a wide range of industries and is even penetrating government. APIs provide a great opportunity for organizations to begin to integrate systems and data. However, decision makers need to think hard about the impact of doing that and the unintended consequences. We look at API security and the rise of API management platforms and gateways as organizations attempt to address security issues.

    President Barack Obama issued an executive order in February with the goal of fostering partnerships between business and government agencies to promote the sharing of cybersecurity information on a voluntary basis. While the executive order did not define the parameters of the cyber-risk and incident information sharing, it did stipulate that any collaboration should preserve the confidentiality of business and personal data as well as the privacy and civil liberties of individuals. In this issue, we look at which artifacts should be shared and how companies can benefit by participating in collaboration and information sharing and analysis centers. Continue Reading

  • What are the challenges of deploying UC apps over Wi-Fi?

    What are the challenges in using UC apps over Wi-Fi? UC expert Michael Finneran explains the network issues caused by deploying UC over Wi-Fi and how they can be resolved. Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close