Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.

Divider

Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Loading...
Loading...
Click here to hide

MaaS360 by Fiberlink

Security Information

Viewing entries tagged with 'management'

Mobile Security: The Layered Defense

In his speaking session at Gartner Catalyst this week, our own Clint Adams revealed the key steps in taking a multilayered approach to mobile security for all organizations.

by Kevin Olivieri | 15 Aug 2014



Which Apps Pose the Biggest Security Risks?

In order to protect your organization from consumer app security threats, a Mobile Device Management (MDM) solution and employee education is needed.

by Kevin Olivieri | 14 May 2014



Facebook AppLinks: The Next Enterprise Mobile Security Sieve?

Facebook recently announced their foray into seamless data sharing on mobile devices with AppLinks, but what will this mean for enterprise mobile security? 

by Rob Patey | 01 May 2014



Demonstrating Secure Mobility at Infosecurity Europe

We’re setting up shop at Earls Court Exhibition Center this week to demonstrate MaaS360’s mobile security capabilities at Infosecurity Europe 2014.

by Kevin Olivieri | 28 Apr 2014



Key Security Features and the future of iOS 7 in the Enterprise

Part 2 of our iOS 7 webinar series, which focused on new security features, became the most popular webinar of 2013. We revist the security advances, how MaaS360 enhances these, and look towards the future of iOS 7 in the enterprise.

by Kevin Olivieri | 14 Feb 2014



New year, new devices

Mobile devices have become so much a part of our everyday lives it’s easy to forget that we store our personal information, banking information, personal pictures, medical information on them. And then we buy a new mobile device because ours simply isn’t fast enough, cool enough or new enough to keep up with the speed of data growth.

by David Lingenfelter | 20 Jan 2014



Can IT COPE with BYOD? Apparently Not!

When it comes to mobile devices, IT is still keeping tighter reigns on corporate versus personally owned smartphones and tablets, even though mobile device management can enforce the same security policies across the board. 

by Rob Patey | 06 Nov 2013



Surging Mobile Usage Necessitates BYOD Security Separation

“Containers” or a dual-persona approach has become the one of the most popular methods in separating work from play and ensuring air-tight protection of mobile content.

by Pragati Chaplot Jain | 19 Sep 2013



Soft Passcodes Still Prevail on Enterprise Mobile Devices

Passcodes serve as the “lowest hanging fruit” of mobile security for enterprises, yet recent data from Fiberlink’s MaaS360 platform uncovers this startling fact: 15% of organizations still don’t enforce this most basic security measure.

by Rob Patey | 20 Aug 2013



Developing, Managing, and Securing Mobile Apps in the Enterprise

Application development continues to intensify in the enterprise. Learn what IT do to ensure total management and security of these apps after they've made their way to devices.

by jharrington | 03 May 2013


1 2 3 4 5

Get Involved!

Sign in using one of your existing social accounts.

...or manually register for a new account here.

Free Webinars

@MaaS360 on Twitter more...

  • MaaS360 MaaS360 by IBM
    Half of employers will require their employees to use personal devices for work by 2017 bit.ly/1ozYCwQ
  • MaaS360 MaaS360 by IBM
    In Case You Missed It: Mobility News from the week of August 25th ? 29th bit.ly/1pDIws8
  • MaaS360 MaaS360 by IBM
    Two researchers have discovered a flaw in #Android devices that allows applications to be hijacked. bit.ly/1tquLi9

Most Active Users

vhetrick
2014_08_14
jharrington
Joe Pappano
bcampbell
KaylaBittne...
Donna Lima
jwittkopp
manthony
Kumar A
Sobek
Fov
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.