Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.

Divider

Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Loading...
Loading...
Click here to hide

MaaS360 by Fiberlink

Security Information

Viewing entries tagged with 'app'

Solving App Security Problems with Mobile Application Management

In order for organizations to embrace BYOD's mobility and productivity benefits, they'll first need  to maintain a safe and secure mobile app environment.

by Kevin Olivieri | 01 Oct 2014



Mobile Security: The Layered Defense

In his speaking session at Gartner Catalyst this week, our own Clint Adams revealed the key steps in taking a multilayered approach to mobile security for all organizations.

by Kevin Olivieri | 15 Aug 2014



Which Apps Pose the Biggest Security Risks?

In order to protect your organization from consumer app security threats, a Mobile Device Management (MDM) solution and employee education is needed.

by Kevin Olivieri | 14 May 2014



Facebook AppLinks: The Next Enterprise Mobile Security Sieve?

Facebook recently announced their foray into seamless data sharing on mobile devices with AppLinks, but what will this mean for enterprise mobile security? 

by Rob Patey | 01 May 2014



Developing, Managing, and Securing Mobile Apps in the Enterprise

Application development continues to intensify in the enterprise. Learn what IT do to ensure total management and security of these apps after they've made their way to devices.

by jharrington | 03 May 2013



Balancing Mobile Security and Productivity with BYOD Privacy

Though today’s mobile ecosystem is bustling with new features, application and product launches, it is not doing enough to cater to enterprise security and privacy needs. Second to mobile security, mobile privacy is an emerging, sensitive issue for many bring your own device (BYOD) workers.

by Pragati Chaplot Jain | 01 May 2013



Smartphone Fugue States Give Way to Apple Picking!

Learn how your company can safeguard data in the age of Apple Picking, or theft of BYOD devices in highly populated areas.

by Rob Patey | 22 Feb 2013



Mobile Data Security: A Primer for Financial Institutions

With sensitive information being passed back and forth between mobile devices, today’s banking and financial institutions must be prepared for the worst. Use this how-to guide to gauge your preparedness for data leak risks and regulatory compliance.

by Pragati Chaplot Jain | 06 Feb 2013



Locate and Wipe Out BYOD Security Threats

While many benefits accompany mobility trends such as bring your own device (BYOD), challenges also abound. Read and learn what options are available to take on enterprise mobility securely and responsibly.

by Jonathan Dale | 20 Nov 2012



BYOD Beware! [INFOGRAPHIC]

This infographic shows how real professionals feel about bring your own device (BYOD) and the privacy breaching backlash often associated with it.

by Jonathan Dale | 26 Sep 2012


1 2 3 4

Get Involved!

Sign in using one of your existing social accounts.

...or manually register for a new account here.

Free Webinars

@MaaS360 on Twitter more...

  • MaaS360 MaaS360 by IBM
    Spending on Consumer Electronics and Midsize IT to Break Records bit.ly/1uzco6i
  • MaaS360 MaaS360 by IBM
    Live Training TODAY: Setting Up Your MaaS360 Portal bit.ly/1vvbr4i
  • MaaS360 MaaS360 by IBM
    The Consumerization of Health Care and Midsize IT bit.ly/1tI9CkD via IBM Midsize Insider

Most Active Users

vhetrick
2014_08_14
jharrington
Joe Pappano
KaylaBittne...
bcampbell
Donna Lima
jwittkopp
manthony
Kumar A
Giovanni
CitizenSane
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.