Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.

Divider

Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Loading...
Loading...
Click here to hide

MaaS360 by Fiberlink

Policy Management

MaaSters Blog

Viewing entries tagged with 'security'

The Interplay of BYOD Policies and Solutions

Corporate decision-makers need to work with IT departments, as well as all employees, to formulate the most effective bring your own device (BYOD) policies to guide the use of mobile security technology.

by Jonathan Dale | 15 Aug 2013



The Ins and Outs of BYOD in Healthcare

With HIPAA and other stringent regulations, how can healthcare providers adapt to bring your own device (BYOD)?

by jharrington | 25 Jan 2013



Braving BYOD on Black Friday

Black Friday is just around the bend and the mobile landscape is abounding with tablet and smartphone options. How will you play mobility safe heading into this holiday season?

by Pragati Chaplot Jain | 21 Nov 2012



Juggling BYOD and Workforce Concerns

Has enterprise IT done enough to educate the mobile workforce about bring your own device (BYOD) programs?

by Pragati Chaplot Jain | 08 Oct 2012



Veterans Affairs Vies for Top Notch Mobile Strategy

The U.S. Department of Veterans Affairs outlined several rules that should be followed by organizations hoping to leverage new technologies in "the age of mobility."

by Rob Patey | 27 Aug 2012



Mobile Device Management Roadmap for CIOs

Mobile Device Security Measures What measures are you taking to address the bring your own device (BYOD) trend? Narrowing support down to specific devices may be a tempting approach. Some CIOs are saying "no" all together. As easy as each of these sound, they may be eliminated as options for CIOs moving forward. This assertion comes from a recent report by IDG News Service, highlighting a panel discussion that took place at the MIT Sloan CIO Symposium in Cambridge, Massachusetts. The panel fervently discussed BYOD and affirmed the critical role that mobile device management (MDM) has had in assisting IT and the enterprise as a whole. "IT departments can either support [the BYOD trend] or be a receiver of the fallout," said Rob Stefanic, CIO of Sensata Technology According to Stefanic, Sensata didn't completely understand the consequences of employees connecting to the network with mobile devices when the company adopted a cloud-based platform in 2007. The current goal for IT is to reduce the impact of security breaches without limiting employee access to company data.It can be tough to find a balance between security and freedom, but the first step is knowledge. To discover the essential demands BYOD policies should meet, read The Ten Commandments of BYOD.

by MaaS360 staff | 31 May 2012



BYOD: Striking a Balance - Webinar Recap

Product Marketing Manager

by MaaS360 staff | 03 May 2012



Whitelisting and Blacklisting Apps in the Classroom

Similar to shoppers in the trenches of a local Apple store, K-12 schools have made it a top priority to get their hands on the latest gadgets and technology. Teachers are calling for bundles of iPads to be delivered for their students, and its popularity has spread nationwide. To get a picture for what I'm talking about, Apple reported in September at least 600 school districts had begun implementing one-to-one programs where at least one classroom makes a tablet available to every student. Its quite an anomaly whenever a consumer-driven technology can take the learning process such a long way. But who's complaining? Increased engagement is the very reason demand for the iPad continues to increase. It gives young learners something they enjoy using when they're not in the classroom and puts it right in front of them. An added benefit is the ability to stay up-to-date on material. The last thing a school district on a tight budget wants to do is buy in to the repeated process of textbook replacement.

by MaaS360 staff | 24 Feb 2012



Mass Data Protection Law: Start of a Trend?

On March 1st, 2010, the state of Massachusetts raised the bar for companies and their IT organizations by implementing tough legislation that requires new protections for customer data. Any organization that has customers located in Massachusetts will have to abide by 201 CMR 17.00: Standards for the Protection of Personal Information of Residents of the Commonwealth, aka, the Mass Data Protection Law. This regulation applies to all organizations "who own, license, store or maintain personal information about a resident of the Commonwealth of Massachusetts."

by MaaS360 staff | 01 Mar 2010



Security Beyond the Castle

Guest blog from David Lingenfelter, Fiberlink Security Officer

by MaaS360 staff | 30 Apr 2009


Get Involved!

Sign in using one of your existing social accounts.

...or manually register for a new account here.

Free Webinars

@MaaS360 on Twitter more...

  • MaaS360 MaaS360 by IBM
    Why we've been named a leader in the 2014 Aragon Research Globe for Enterprise Mobile Management: bit.ly/16w933k
  • MaaS360 MaaS360 by IBM
    MaaSter the Windows Ecosystem with MaaS360 with this on-demand video: bit.ly/1sG9A7a
  • MaaS360 MaaS360 by IBM
    #WatchNow: Best practices for securing and managing the Windows Ecosystem bit.ly/1sDSpTZ

Most Active Users

vhetrick
2014_08_14
jharrington
KaylaBittne...
Joe Pappano
bcampbell
Donna Lima
jwittkopp
manthony
KumarA
Giovanni
Pragati Cha...
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.