Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.

Divider

Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Loading...
Loading...
Click here to hide

MaaS360 by Fiberlink

Security Information

Viewing entries tagged with 'app'

Developing, Managing, and Securing Mobile Apps in the Enterprise

Application development continues to intensify in the enterprise. Learn what IT do to ensure total management and security of these apps after they've made their way to devices.

by jharrington | 03 May 2013



Balancing Mobile Security and Productivity with BYOD Privacy

Though today’s mobile ecosystem is bustling with new features, application and product launches, it is not doing enough to cater to enterprise security and privacy needs. Second to mobile security, mobile privacy is an emerging, sensitive issue for many bring your own device (BYOD) workers.

by Pragati Chaplot Jain | 01 May 2013



Smartphone Fugue States Give Way to Apple Picking!

Learn how your company can safeguard data in the age of Apple Picking, or theft of BYOD devices in highly populated areas.

by Rob Patey | 22 Feb 2013



Mobile Data Security: A Primer for Financial Institutions

With sensitive information being passed back and forth between mobile devices, today’s banking and financial institutions must be prepared for the worst. Use this how-to guide to gauge your preparedness for data leak risks and regulatory compliance.

by Pragati Chaplot Jain | 06 Feb 2013



Locate and Wipe Out BYOD Security Threats

While many benefits accompany mobility trends such as bring your own device (BYOD), challenges also abound. Read and learn what options are available to take on enterprise mobility securely and responsibly.

by Jonathan Dale | 20 Nov 2012



BYOD Beware! [INFOGRAPHIC]

This infographic shows how real professionals feel about bring your own device (BYOD) and the privacy breaching backlash often associated with it.

by Jonathan Dale | 26 Sep 2012



Top Mobile Security Threats of 2012

As the BYOD trend becomes more prevalent in the workplace, the struggle to secure all data endpoints intensifies. Now more than ever, we must understand and plan around the most prevalent mobile security threats.

by Pragati Chaplot Jain | 03 Aug 2012



Network Access Control and Mobile Device Management Enhance BYOD

After each deployment, network administrators are quick to relish in the payoffs of the fusion between mobile device management (MDM) and network access control (NAC). As standalone offerings, NAC and MDM give contemporary IT the tools to solidify their network security and device management initiatives. Integrating NAC features into a MDM solution leaves IT with one of the most flexible approaches to securely support Bring Your Own Device (BYOD) programs in the enterprise.

by MaaS360 staff | 29 May 2012



Employee-owned Devices Transform Businesses as MDM Transforms IT

Bring Your Own Device (BYOD) programs have created more security and management concerns than enterprise IT bargained for. Or so it seemed. According to a recent Cisco study, businesses that have chosen to implement BYOD have been quick to learn the benefits. As it turns out, the successful implementation of mobile device management (MDM) platform is neither impossible nor impractical.

by MaaS360 staff | 21 May 2012



Fiberlink Positioned as a Leader in the Gartner Magic Quadrant for Mobile Device Management Software

Fiberlink is pleased to announce that we have been positioned as a Leader in the 2012 Gartner Magic Quadrant for Mobile Device Management Software.We believe that Gartner Magic Quadrants have become one of the most influential research reports upon which IT buyers use for their evaluations and purchases. Fiberlink was positioned in the Leaders Quadrant based on completeness of vision and ability to execute.

by MaaS360 staff | 18 May 2012


1 2 3

TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.