Tips
Tips
Wireless and mobile security
-
Top questions to ask mobile device management vendors
With so many mobile device management vendors and products in the marketplace, choosing one to use in your enterprise can be a challenge. Check out these 13 vendor questions that will help make the evaluation process easier. Continue Reading
-
How to evaluate mobile device management features
No two enterprises are alike, and no mobile device management product is one-size-fits-all. Learn about two different MDM considerations you need to keep in mind during the evaluation process: platforms and deployment options. Continue Reading
-
Conquer BYOD risks with mobile device management
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks. Continue Reading
-
Find the best mobile device management system for your business needs
Evaluating products and services to find the best mobile device management product not only fulfills business needs but also spends a budget wisely. Expert Lisa Phifer offers four principles to consider when selecting an MDM strategy. Continue Reading
-
Windows 8.1 features that secure BYOD access
Ensuring BYOD access in an enterprise environment can be quite challenging, especially when it comes to balancing security with employee satisfaction. Learn about different Windows 8.1 features that can help ease the process. Continue Reading
-
VDI and BYOD: Enterprise mobile security solution or security faux pas?
Employees want to use their own mobile devices at work. Enterprises need to ensure the safety of their corporate data. Can VDI solve BYOD security issues? Expert Michael Cobb discusses why VDI may not hold all the answers. Continue Reading
-
Amazon Fire Phone security features and pitfalls
The Amazon Fire Phone has the potential to ignite interest among enterprise users, but are security issues lurking beneath its shiny façade? Expert Lisa Phifer reviews the Fire Phone's security features and shortcomings. Continue Reading
-
An MDM strategy in a BYOD world must focus on data first, then devices
In the BYOD era, mobile device security requires a strategy that focuses on data, not device, protection. Continue Reading
-
Are malicious mobile apps a mere inconvenience or a real threat?
How big a security threat are the malicious mobile apps riding into your enterprise on employees' mobile devices? Continue Reading
-
Apple iOS security secrets revealed: Is iOS truly enterprise-ready?
Apple has provided little transparency of its iOS -- until now. Are Apple devices truly secure enough for enterprise use? Michael Cobb explains. Continue Reading
-
App security: Decompiling Android APK files
Find hidden malware or security weaknesses by decompiling Android applications into Java source code. Continue Reading
-
Obad.a analysis: Is malware on Android devices now equal to Windows?
Expert Nick Lewis determines how enterprises should react to Obad.a, a strand of malware on Android devices reportedly equal to that on Windows. Continue Reading
-
Deploying network security devices: Tips to avoid failed deployments
John Burke offers advice on effectively deploying network security devices to protect sensitive data and manage the mobility boom in the enterprise. Continue Reading
-
Unmanaged endpoints? Rethink the defense-in-depth security model
Today's endpoint security model is failing. What's next? Learn why endpoint defense-in-depth controls must assume the endpoint is compromised. Continue Reading
-
How key MDM features affect mobile security policy management
As MDM features become more robust, enterprises must not only look for mature products, but also evolve mobile security policies accordingly. Continue Reading