As the holiday season ushers in new smartphones and tablets for many, don't be one of the 68% of folks who say data leak protection is the last thing on their mind before discarding their old devices. Follow these four steps to ensure the security of your corporate data.
Through managing security policies, configuring device settings, management of mobile apps and more, MaaS360 and Samsung KNOX can provide a safe and secure environment for Android devices in the enterprise.
As BYOD programs become more and more common in organizations across the globe, a well-thought-out plan that employs the best MDM solution and takes legal risks into consideration will be necessary for success.
In order to alleviate the risks involved with data breaches caused by unsecured personal devices in the healthcare industry, a combination of Network Access Control (NAC) and Mobile Device Management (MDM) is needed.
An updated operating system is helping Amazon make the case for establishing the Kindle Fire as the ideal workplace tablet. We recap our most recent webinar and look at how you can incorporate these tablets into your BYOD program.
Omnibus has recently impacted healthcare providers and their affiliates as it strengthens the rules and regulations found in HIPAA and HITECH. Is your mobile environment Omnibus compliant?
Security experts have discovered deep rooted vulnerabilities in the mobile ecosystem – the Android Master Key vulnerability and SIM Card vulnerability. This news should give the consumer market the most pause for concern from these malicious miscreants, but businesses should also be wary, especially those allowing Bring Your Own Device (BYOD).
Guest article. The following is by Emily, a High School student entering her senior year and learning about Mobile Device Management (MDM) during her summer internship with MaaS360. Emily was asked to highlight how her school is using mobile devices to improve education and how MDM can help.
Rural takes on a new definition in the mobile age. Where once cable and wiring were the only roads to network connectivity, today’s intangible infrastructure can connect a farmer on the back forty as easily as a stock broker on 42nd street.
Faster than a speeding bullet, mobile devices have infiltrated ITs fortress of technology procurement solitude. Unlike most villains to IT, this is one with a noble pursuit. Users aren’t trying to overthrow ITs sovereignty as part of some nefarious scheme, they are merely trying to get more work done with the technology they are most comfortable with. Bring Your Own Device (BYOD) offers untold potential for organizations, and IT can serve this new nirvana of productivity assuming they bring the right super powers to the battle.