Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.


Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Click here to hide

MaaS360 by Fiberlink

Mobility Management

Viewing entries tagged with 'mobile-security'

Tablets as Holiday Gifts

So, which tablet did you receive over the holiday season? Was it the Kindle Fire, the Motorola Xoom, or the iPad?

by MaaS360 staff | 09 Jan 2012

Understanding the Risks of Unmanaged Exchange ActiveSync Partnerships

Exchange ActiveSync is great for "push" email synchronization with mobile devices, but as a mobile device management platform it has serious architectural and administrative limitations that leave you exposed to significant security risks. To illustrate the point, let's examine how many company’s enable access to Exchange from mobile devices.

by MaaS360 staff | 29 Mar 2011

Mobile Security - Outsider Threat vs Insider Threat

As you develop your mobility strategy, start thinking about security, and begin the process of evaluating Mobile Device Management solutions (and who isn’t at the moment), it’s easy to get lost in the weeds, spending time talking about features, functionality, life cycle management and device support. Every once in a while, it makes sense to pause and remember what the primary goals of Mobile Device Management are. 

by MaaS360 staff | 10 Mar 2011

Why do IT departments lose when Android wins the smartphone battle?

The Nielsen Company recently released metrics about consumer marketshare by operating system for smartphones in the US. I’m not sure why some people are surprised by these numbers however, I don’t think the division of marketshare is the key story. If you are wondering what they looked like, you can see the report here: Nielsen Report. For the record, the top 3 are Android (29%), Apple (27%) and RIM (27%). Behind these numbers is something bigger, with greater impact on all companies regardless if they are supplying smartphones to their workers or if they allow workers to bring in their personal devices.

by MaaS360 staff | 04 Mar 2011

RSA Conference Recap

It’s been a few days since the RSA Conference and I’ve had time to absorb everything that was there.  With the sessions, keynote addresses, vendor floor and the socializing, the whole conference was definitely something worth experiencing.  The conference had more than 320 companies exhibiting their tools and technologies, over 255 sessions and 540 speakers. 

by MaaS360 staff | 23 Feb 2011

RSA Conference - Day Four

by MaaS360 staff | 18 Feb 2011

RSA Conference - Day Three

by MaaS360 staff | 17 Feb 2011

RSA Conference - Day Two

The morning consisted of keynote addresses, awards and a panel discussion with the biggest names in cryptography. The opening keynote was made by RSA Chairman, Arthur Coviello. It was in part a call to arms. Art announced the Cloud Trust Authority initiative, a series of cloud-based services designed to enable organizations and cloud service providers to work together to design security into cloud initiatives. Art also commented that the cloud and virtualization will dramatically change security. No doubt, it has to. Traditional security technologies cannot scale to or adapt to the fluid nature of the cloud. This notion of change being needed in how security is implemented in a cloud model resonated throughout the rest of the day, and I’m sure will be repeated throughout the rest of the week. Art had VMware Chief Development Officer, Richard McAniff on stage with him talking about developing for a trusted cloud.

by MaaS360 staff | 16 Feb 2011

RSA Conference - Day One

First day at the RSA Conference and it’s off to a great start.  As expected, one of the big topics everyone is talking about is cloud computing.  It helps that the conference started with the Cloud Security Alliance Summit, but it was bigger than just that.  The talk in the halls was all about cloud computing, as well.  From data warehouse vendors, to multi-factor authentication vendors, to consumers from all walks of life, cloud computing is on everyone’s mind. 

by MaaS360 staff | 15 Feb 2011

Get Involved!

Sign in using one of your existing social accounts.

...or manually register for a new account here.

@MaaS360 on Twitter more...

  • MaaS360 MaaS360 by IBM
    New on the blog: iNcreasing Productivity with the iPhones in Your Mobile Environment bit.ly/1Ci0Rky
  • MaaS360 MaaS360 by IBM
    Mobilize your contingent workforce while protecting data. Join @MaaS360 Thursday to learn how: bit.ly/1CEbE7m #Mobile4All
  • MaaS360 MaaS360 by IBM
    Q4 Smartphone sales shows iPhone was the top dog. Here's how to get the most out of them in the enterprise: bit.ly/1Ci0Rky

Most Active Users

Joe Pappano
Donna Lima
Pragati Cha...
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.