Mobile devices have become essential tools for companies reacting to today's breakneck rate of change. Just as customers and consumers expect to be able to do more with devices such as smartphones and tablets, so too do employees and
Protecting data on mobile devices is key to complying with new EU privacy regulations going into effect in May. With the deadline looming, here’s what you should be asking your EMM vendor.
After integrating with VMware's Workspace ONE's UEM cloud portal last year, Google has now expanded the number of enterprise mobility management platforms IT managers can use to control Chrome OS devices.
For the first time ever, Google has published a set of standards it says smartphones must meet to be business friendly, highlighting those that get regular security patches and at least one major OS update.
Nathan Freitas, who heads The Guardian Project, talks with host Steve Ragan and senior writer J.M. Porup about the group's easy-to-use secure apps, open-source software libraries, and customized mobile devices being used around the...
The reason for the extremely high rate of adoption of mobile devices is simple: using mobile technology increases productivity, employee satisfaction, and can even save money. Mobility's benefits are sometimes exponentially better
It’s time to add MTD to your Enterprise Mobile Management toolkit. Because it’s better to get ahead of mobile threats than it is to try and clean them up after you’ve been attacked.
Get the eBook "How to Buy an Enterprise Mobile Security Solution" to assist you throughout the process of managing a mobile security initiative, including guidance for every phase of a mobile security project from evaluating solutions
MobileIron has partnered with a machine learning-based threat detection vendor to port its technology onto its EMM client, a growing trend in the mobile space.
Veteran chief information security officer Barak Engel blasts the mobile community for torpedoing enterprise security in his new book, "Why CISOs Fail Security."
Your organization's sensitive data has made the mobile ecosystem the new frontier for a wide spectrum of risk that every CISO must now understand. Take a look at the Mobile Risk Matrix in this infographic now.
As mobile device management continues to morph, consider what EMM features you need right now as well as what you might need in the future -- and don't neglect the user experience.
While all mobile devices have inherent security risks, Android has more vulnerabilities because of its inherent open-source nature, the slow pace with which users update the OS and a lack of proper app vetting.