The MaaSters Center is pleased to welcome Maribel Lopez from Lopez Research as a member and contributor. Maribel will provide her insights and commentary on the rapidly changing Mobile Landscape in a series focused on the challenges faced by IT departments, the importance of Enterprise Mobility Management (EMM), and which functions are important when choosing an EMM solution.
Microsoft released this week information about an issue in their OS that has made hundreds of applications that run on Windows vulnerable to attack.
As you know from reading this blog, I work for Fiberlink, a company that operates a “Mobility-as-a-Service” platform called MaaS360. The marketing tag line for this platform is “See. Know. Go.”
Remember the days of investment bankers and investors carrying around the Blackberry 850 that looked more pager than the start of today’s smart phone craze?
In our previous posts we surveyed regulations and standards with provisions that apply specifically to endpoints, and looked at the Information Security Handbook from the Federal Financial Institutions Examination Council (FFIEC) for guidance on best practices.
In our previous post we surveyed several regulations and standards with provisions that apply specifically to endpoints.
The financial industry is of course highly regulated. But what financial industry regulations and standards apply specifically to endpoints, and to data stored on mobile and distributed devices?
According to Wikipedia: A bridge is a structure built to span a valley, road, body of water, or other physical obstacle, for the purpose of providing passage over the obstacle.
android apple blackberry bring your own device byod cloud-computing emm enterprise mobility management ios ipad iphone it maas360 mam mdm mobile-device-management mobile application management mobile device management mobile security mobility mobility-as-a-service mobility-management security smartphone tablet