Mobile

  • Tame the challenge of mobile device management

    Does your organization allow employees to access company resources such as email or other applications via mobile devices? If so, then you owe it to your employer to learn how to secure these devices and, more importantly, the corporate assets they access. Last week we pointed you to a really good report, "A Window into Mobile Device Security," from Carey Nachenberg, VP and fellow at Symantec Corporation. Nachenberg describes the native security capabilities of two of the top mobile operating systems: iOS from Apple and Google's Android. The Symantec report looks at how these OSs compare with regards to five pillars of security: traditional access control, application provenance, encryption, isolation, and permission-based access control.
  • Mobile security: iOS vs. Android vs. WebOS vs. the rest

    It's no longer a question of whether your business will support tablets and smartphones. And at most organizations, it's no longer a question of whether you'll support multiple mobile OSes. The question is, which mobile OSes can you support? I've put together a table (on the next page) of what the mainstream mobile OSes supports for security and management, so you can tell quickly which platforms offer the fundamental capabilities you require.
  • Managing iPads in enterprise networks

    These days users expect to be able to use their iPads inside the business and as thousands of software vendors release applications for the iOS platform which provide data mobility and usability benefits to employees, the prospect of the iPad as a business device is becoming a forced reality. Many companies are looking to deploy Mobile Device Management (MDM) tools to manage the devices, and vendors like McAfee have included MDM features into their end point management solutions.
  • Mobile Changing the Way Enterprises Buy Technology

    Mobile devices and applications are streaming into enterprises, changing the way IT departments buy technology and relate to other employees, three vendor executives said this week at the MobileBeat conference in San Francisco. The growing popularity of mobile platforms has forced enterprises to notice and sometimes embrace the kinds of technology that employees are bringing in to work, the CEOs of MobileIron, QuickOffice and Box.net said during a Wednesday panel discussion at the event.
  • HP plans major enterprise push for TouchPad

    HP straddles two worlds: enterprise systems and consumer electronics. Its new TouchPad tablet is intended to satisfy the needs of both. But you'll have to look harder and wait longer to see HP's unfolding enterprise plan for TouchPad. The Wi-Fi TouchPad, running the webOS firmware created by Palm, goes on sale Friday starting at $500 in stores ranging from Amazon to Walmart, the same outlets that handle its PCs and printers. But the tablet is "enterprise ready," says HP's David Gee, vice president of marketing and enterprise solution for the Palm Global Business Unit. He oversees the marketing strategy for all webOS devices as well as development of webOS-based "solutions" for business customers.
  • The trials of iPad enterprise adoption

    Earlier this year, New York-based law firm Proskauer completed a massive technology redesign that would make Silicon Valley tech companies gush with envy. At the heart of the redesign was the Apple iPad 2. "I'm pretty sure we were the first, if not only major law firm, to do it," says COO Arthur Gurwitz. "I think it was important to be first with the iPad. I call it brand enhancement."
  • Smartphones, Security and the Enterprise: The Equation to Solve

    Author: SonicWALL
    The main benefit of smartphones is the potential productivity gains they could bring to businesses. As well as allowing employee-owned devices into the office, your enterprise should also consider which platform fits best when providing these devices to workers. This paper outlines the security capabilities of each of the major smartphone platforms. Read now to discover which platform could keep your organization most safe.
  • Your iPhone keeps an unencrypted record of your movements

    Author: Help Net Security
    If you are are owner of an iPhone or a 3G iPad, you'll probably want to know that your location - along with a timestamp - is at all times recorded by the device and stored into a file called "consolidated.db," which is then copied on the computer to which you synchronize the device. The file and its contents were discovered by Alasdair Allan and Pete Warden, two researchers that were collaborating on some data visualization projects and were curious whether they could do a visualization of mobile data.