Mobile

  • Tame the challenge of mobile device management

    Does your organization allow employees to access company resources such as email or other applications via mobile devices? If so, then you owe it to your employer to learn how to secure these devices and, more importantly, the corporate assets they access. Last week we pointed you to a really good report, "A Window into Mobile Device Security," from Carey Nachenberg, VP and fellow at Symantec Corporation. Nachenberg describes the native security capabilities of two of the top mobile operating systems: iOS from Apple and Google's Android. The Symantec report looks at how these OSs compare with regards to five pillars of security: traditional access control, application provenance, encryption, isolation, and permission-based access control.
  • Mobile security: iOS vs. Android vs. WebOS vs. the rest

    It's no longer a question of whether your business will support tablets and smartphones. And at most organizations, it's no longer a question of whether you'll support multiple mobile OSes. The question is, which mobile OSes can you support? I've put together a table (on the next page) of what the mainstream mobile OSes supports for security and management, so you can tell quickly which platforms offer the fundamental capabilities you require.
  • Managing iPads in enterprise networks

    These days users expect to be able to use their iPads inside the business and as thousands of software vendors release applications for the iOS platform which provide data mobility and usability benefits to employees, the prospect of the iPad as a business device is becoming a forced reality. Many companies are looking to deploy Mobile Device Management (MDM) tools to manage the devices, and vendors like McAfee have included MDM features into their end point management solutions.
  • Mobile Changing the Way Enterprises Buy Technology

    Mobile devices and applications are streaming into enterprises, changing the way IT departments buy technology and relate to other employees, three vendor executives said this week at the MobileBeat conference in San Francisco. The growing popularity of mobile platforms has forced enterprises to notice and sometimes embrace the kinds of technology that employees are bringing in to work, the CEOs of MobileIron, QuickOffice and Box.net said during a Wednesday panel discussion at the event.
  • HP plans major enterprise push for TouchPad

    HP straddles two worlds: enterprise systems and consumer electronics. Its new TouchPad tablet is intended to satisfy the needs of both. But you'll have to look harder and wait longer to see HP's unfolding enterprise plan for TouchPad. The Wi-Fi TouchPad, running the webOS firmware created by Palm, goes on sale Friday starting at $500 in stores ranging from Amazon to Walmart, the same outlets that handle its PCs and printers. But the tablet is "enterprise ready," says HP's David Gee, vice president of marketing and enterprise solution for the Palm Global Business Unit. He oversees the marketing strategy for all webOS devices as well as development of webOS-based "solutions" for business customers.
  • The trials of iPad enterprise adoption

    Earlier this year, New York-based law firm Proskauer completed a massive technology redesign that would make Silicon Valley tech companies gush with envy. At the heart of the redesign was the Apple iPad 2. "I'm pretty sure we were the first, if not only major law firm, to do it," says COO Arthur Gurwitz. "I think it was important to be first with the iPad. I call it brand enhancement."
  • Smartphones, Security and the Enterprise: The Equation to Solve

    Author: SonicWALL
    The main benefit of smartphones is the potential productivity gains they could bring to businesses. As well as allowing employee-owned devices into the office, your enterprise should also consider which platform fits best when providing these devices to workers. This paper outlines the security capabilities of each of the major smartphone platforms. Read now to discover which platform could keep your organization most safe.
  • Your iPhone keeps an unencrypted record of your movements

    Author: Help Net Security
    If you are are owner of an iPhone or a 3G iPad, you'll probably want to know that your location - along with a timestamp - is at all times recorded by the device and stored into a file called "consolidated.db," which is then copied on the computer to which you synchronize the device. The file and its contents were discovered by Alasdair Allan and Pete Warden, two researchers that were collaborating on some data visualization projects and were curious whether they could do a visualization of mobile data.
  • Smartphone wave challenges enterprise security

    Author: Computerworld
    With ever more employees clamoring to use smartphones for both personal and business purposes, IT and security managers are forced to answer tough questions: First, will there be sanctioned enterprise adoption of Apple's iPhone -- not to the mention the iPad -- as well as smartphones based on Google's Android operating system, if not even more varieties? And, if employees want to use their own smartphone or iPad in business, will that be allowed? Finally, how will the enterprise prepare to exert management and security controls in a multi-operating system smartphone environment, or figure out how to secure data on a device that the employee, not the enterprise, officially owns?
  • Four Steps to Achieving iPhone Security 
at Scale in the Enterprise

    Author: iphonelife
    The iPhone has been a catalyst for changing the way end-users and organizations think about their phones. Users want iPhones for the exceptional experience they provide and because they support a broad range of business applications. The iPhone and its new sibling, the iPad, are now a business reality. Enterprise IT departments need to develop strategies to support large-scale deployments of these devices
  • iPhone in Business-Mobile Device Management

    Author: Apple
    iPhone supports Mobile Device Management, giving businesses the ability to manage scaled deployments of iPhone across their organizations. These Mobile Device Manage- ment capabilities are built upon existing iOS technologies like Configuration Profiles, Over-the-Air Enrollment, and the Apple Push Notification service and can be integrated with in-house or third-party server solutions. This gives IT departments the ability to securely enroll iPhone in an enterprise environment, wirelessly configure and update settings, monitor compliance with corporate policies, and even remotely wipe or lock managed iPhone devices.
  • Samsung smartphone shipped with malware-infected memory card

    Author: Help Net Security
    The latest mass-market product that has been found being shipped to customers while containing malware is the Samsung S8500 Wave phone with the Samsung bada mobile platform. The malicious file in question is slmvsrv.exe, and can be found on the 1GB microSD memory card contained in the smartphone. The malicious file is accompanied by an Autorun.inf file, which installs itself on any Windows PC that still has the autorun feature enabled.
  • Critical iPhone security issue leaves your contents exposed

    Author: Help Net Security
    Most iPhone users are confident that using a passcode to secure their devices means that even if they lost them or they get stolen, their data will be protected from prying eyes. Unfortunately for them, Bernd Marienfeld, an information security professional, has discovered last week that the passcode protection can be bypassed by simply connecting the iPhone 3GS in question to a computer running Ubuntu 10.04.
  • Increasing security on mobile applications will extend adoption

    Author: Help Net Security
    Many of today’s mobile applications have limited functionality from a lack of overall security, according to a study by Entrust. And for mobile applications that feature transaction-based capabilities, the requirement for security is even greater, highlighting a key area of concern for deploying organizations.
  • Managing and securing iOS 4 devices at work

    Author: Computerworld
    As more iPhones go to work, IT shops have more options to handle them. Apple Inc.'s iPhone has always had something of an image problem in the workplace, which isn't surprising given that Apple has always marketed its smartphone more to consumers than to the business world. In fact, when the iPhone debuted in 2007, there was no way to put third-party apps on one without jailbreaking the device, it didn't support 3G data networks, it didn't integrate with Microsoft's Exchange, and you had to use iTunes to activate it initially and back up or sync data later on. Plus, there were security concerns, since there was no way to require a passcode, encrypt business data or remotely wipe an iPhone if it was lost or stolen.
  • Enterprise iPhone Deep Dive Report

    Author: InfoWorld
    InfoWorld's experts evaluate the most compelling mobile device -- Apple's iPhone -- in the context of what matters to business and IT professionals
  • Has unified mobile management for business arrived?

    Author: InfoWorld
    New MobileIron platform for BlackBerry, iPhone, and others promises to make smartphone management enterprise-class
  • iPad Dev Video

    Jesse Lindeman at a recent iPad developers panel
  • Creating a Holistic Mobility Strategy

    Author: by Philippe Winthrop, Strategy Analytics
    Download a FREE copy of "Creating a Holistic Mobility Strategy" and learn best practices for enterprise mobility from leading mobile analyst, including key provisioning features and mobile security considerations.