Mobile security
Modern security tools can cover all sorts of devices, but mobile devices present threat vectors, privacy issues and security challenges that aren't common elsewhere. For example, device loss and theft can occur much easier with mobile devices than with PCs. Find out what considerations IT must consider when building a mobile security plan.
New & Notable
Mobile security News
-
March 17, 2022
17
Mar'22
Cisco adds ML to Meraki cameras to track objects
Cisco's MV Sense is available as a subscription with Meraki MV cameras. Companies can use the service to count boxes in a warehouse or track equipment on a factory floor.
-
March 04, 2022
04
Mar'22
HP brings device management to VR headsets
HP's SaaS product lets businesses using HTC and Pico virtual reality headsets track device locations, push application updates, patch devices and set security policies.
-
February 28, 2020
28
Feb'20
Microsoft antivirus software for Android, iOS a reflection of the times
The announcement of Microsoft antivirus software Defender on Android and iOS caused some puzzlement, but experts said the move recognizes the current security landscape.
-
January 23, 2020
23
Jan'20
Sophos adds mobile threat defense app to Intercept X line
Intercept X for Mobile is compatible with iOS and Android devices, as well as Chrome OS and Chromebooks. It offers privacy protection, authentication and other security features.
Mobile security Get Started
Bring yourself up to speed with our introductory content
-
How to perform a full remote wipe on an Android device
When a device is lost or no longer needed for work purposes, a remote wipe can keep corporate data secure. This is a vital safeguard for mobile Android devices in the workplace. Continue Reading
-
8 top digital wallet companies
Digital wallets offer more security and convenience to consumers, with the flexibility to pay from mobile devices. Continue Reading
-
consumerization of IT
The consumerization of IT refers to how software and hardware products designed for personal use migrated into the enterprise and were used for work purposes. Continue Reading
Evaluate Mobile security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
How mobile firewalls protect against unique threat vectors
Firewalls are an essential part of network security. As more employees use mobile devices for work, mobile firewalls are an increasingly vital security tool for enterprises. Continue Reading
-
The story of mobile phishing through statistics
Mobile phishing is a significant threat, and there are many statistics that back this up. Find out what these numbers mean and how they should affect mobile security strategy. Continue Reading
-
Determining the best mobile threat defense options
Desktop security products often cannot cover mobile devices enough. Mobile threat defense can come into the picture and supplement an organization's mobile security. Continue Reading
Manage Mobile security
Learn to apply best practices and optimize your operations.
-
Understanding QR code security issues for enterprise devices
QR codes have many uses for organizations and their employees, but cybercriminals can take advantage of them, too. IT should keep these risks in mind and learn how to avoid them. Continue Reading
-
How to sideload iOS apps and why it's dangerous
IT professionals should be aware of how to sideload iOS applications and why it might be dangerous and inadvisable to do so. Learn the two most common sideload methods below. Continue Reading
-
How text message phishing can affect the enterprise
Text phishing, or smishing, is an increasing occurrence across enterprises. However, IT can neutralize this threat with the right policies and practices. Continue Reading
Problem Solve Mobile security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
3 BYOD security risks and how to prevent them
A BYOD model offers convenience and flexibility, but it also creates security concerns. Here are the key mobile BYOD security risks that IT should consider and how to manage them. Continue Reading
-
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API. Continue Reading
-
What can IT do to enhance Android security?
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the enterprise. Continue Reading