Microsoft released this week information about an issue in their OS that has made hundreds of applications that run on Windows vulnerable to attack.
Remember the days of investment bankers and investors carrying around the Blackberry 850 that looked more pager than the start of today’s smart phone craze?
In our previous posts we surveyed regulations and standards with provisions that apply specifically to endpoints, and looked at the Information Security Handbook from the Federal Financial Institutions Examination Council (FFIEC) for guidance on best practices.
In our previous post we surveyed several regulations and standards with provisions that apply specifically to endpoints.
When I think of an IT workflow, I conjure a vision of a runbook that contains a number of specific steps to accomplish some critical task. In the realm of Endpoint Device Management, much of the time the result of the execution of these steps results in the creation, observation and analysis of a report in order to make sure that certain cost, quality, performance or compliance metrics are being met.
How healthy are your laptops? It’s not a question people regularly ask themselves. They assume that as long as the end user isn’t calling the Help Desk, everything is fine. But this is rarely the case.
android apple blackberry bring-your-own-device bring your own device byod cloud-computing enterprise mobility management ipad iphone it maas360 mam mdm mobile-device-management mobile-devices mobile-security mobile-workforce mobile device management mobility mobility-as-a-service mobility-management security smartphone tablet