Mobile Device Security

Last Updated on 10 Sept. 2014, Total: 8 Articles and Tutorials

  1. Planning Considerations for BYOD and Consumerization of IT (Part 3)

    In this article we’ll finish our coverage of the BYOD solution requirements and the meaning and intent behind them... Read More

  2. Planning Considerations for BYOD and Consumerization of IT (Part 2)

    In this article, we’ll being our planning process by discussing a collection of solution requirements that cuts across all secure BYOD deployments... Read More

  3. Planning Considerations for BYOD and Consumerization of IT (Part 1)

    In the first part of this series on planning considerations for security BYOD and consumerization of IT, we'll look at the BYOD problem domain and discuss key aspects of planning and design... Read More

  4. Has the end of Antivirus arrived?

    With the advance of computing into the world of mobility, has the requirement for antivirus deprecated or is this a case of complacency. Some vendors are claiming that they can get rid of pattern files and others are saying no antivirus altogether. In this article we explore the options and the reality... Read More

  5. The Android Invasion: BYOD Security Implications and Solutions

    This article will go beyond previous discussions on this site about mobile security threats and examine how you may be able to tame the emerging monster that BYOD is becoming... Read More

  6. Why Bring Your Own Device (BYOD) needs your attention

    We are in the middle of the biggest computer revolution since the PC; the explosive number of devices is descending on corporates. In some cases the personal devices can outnumber the corporate devices. This article will cover strategies that should be considered when securing your company... Read More

  7. Windows 8 Tablets: Secure enough for the Enterprise?

    In this article, we'll look at both the obstacles and the reasons Windows 8 tablets just might be able to overcome barriers and take the enterprise by storm... Read More

  8. With the convergence of mobile devices, mobile security is a clear focus

    This article will look at emerging technologies in mobile security, the security risks surrounding mobile platforms and steps to secure your mobile devices and their contents... Read More

Featured Links