Take our FREE 30-Day Trial with no obligation required.

Experience for yourself why MaaS360 is a leader in MDM Solutions.

Divider

Fill out your information below to start.

Your email and personal information are confidential, and will not be sold or rented. See our Privacy Policy for more information.

Loading...
Loading...
Click here to hide

MaaS360 by Fiberlink

Security Information

Viewing entries tagged with 'smartphone'

Is Your Device Security Policy Leaving Your Company Vulnerable?

In the age of BYOD, organizations who aren't taking the proper security precautions, including passcode, application, and encryption policies, are leaving themselves vulnerable to cybercrimes.

by Rob Patey | 05 Feb 2014



New year, new devices

Mobile devices have become so much a part of our everyday lives it’s easy to forget that we store our personal information, banking information, personal pictures, medical information on them. And then we buy a new mobile device because ours simply isn’t fast enough, cool enough or new enough to keep up with the speed of data growth.

by David Lingenfelter | 20 Jan 2014



Can IT COPE with BYOD? Apparently Not!

When it comes to mobile devices, IT is still keeping tighter reigns on corporate versus personally owned smartphones and tablets, even though mobile device management can enforce the same security policies across the board. 

by Rob Patey | 06 Nov 2013



4 Cures for Healthcare Mobility Management Ailments

As mHealth gains popularity, protecting and securing health information on mobile devices has become a key concern for IT in healthcare. Learn how your organization can hurdle today's most common challenges.

by Pragati Chaplot Jain | 16 Apr 2013



Smartphone Fugue States Give Way to Apple Picking!

Learn how your company can safeguard data in the age of Apple Picking, or theft of BYOD devices in highly populated areas.

by Rob Patey | 22 Feb 2013



Network Access Control and Mobile Device Management Enhance BYOD

After each deployment, network administrators are quick to relish in the payoffs of the fusion between mobile device management (MDM) and network access control (NAC). As standalone offerings, NAC and MDM give contemporary IT the tools to solidify their network security and device management initiatives. Integrating NAC features into a MDM solution leaves IT with one of the most flexible approaches to securely support Bring Your Own Device (BYOD) programs in the enterprise.

by MaaS360 staff | 29 May 2012



Fiberlink Positioned as a Leader in the Gartner Magic Quadrant for Mobile Device Management Software

Fiberlink is pleased to announce that we have been positioned as a Leader in the 2012 Gartner Magic Quadrant for Mobile Device Management Software.We believe that Gartner Magic Quadrants have become one of the most influential research reports upon which IT buyers use for their evaluations and purchases. Fiberlink was positioned in the Leaders Quadrant based on completeness of vision and ability to execute.

by MaaS360 staff | 18 May 2012





5 Quick Flicks on MaaS360

Product Marketing Manager

by MaaS360 staff | 25 Apr 2012



The Two Sides of BYOD

by MaaS360 staff | 20 Apr 2012


1 2 3

Get Involved!

Sign in using one of your existing social accounts.

...or manually register for a new account here.

@MaaS360 on Twitter more...

  • MaaS360 MaaS360 by IBM
    How MaaS360 enabled JourneyCare to successfully AND securely support its remote fleet of mobile devices: bit.ly/1r2N9rE #CaseStudy
  • MaaS360 MaaS360 by IBM
    It's important to leverage Mobile Application Management to bolster BYOA safety bit.ly/1h4OHM6
  • MaaS360 MaaS360 by IBM
    What are you doing to prepare for wearables in your office? bit.ly/Qb0Eu5 #wearabletech #WYOD

Most Active Users

vhetrick
Ryan_Roth
jharrington
Joe Pappano
bcampbell
Donna Lima
jwittkopp
KaylaBittne...
manthony
Kumar A
Sobek
Fov
TRUSTe European Safe Harbor certification TruSaaS
© Fiberlink Communications Corp. All rights reserved. Privacy Policy
All brands and their products, featured or referred to within this site, are trademarks or registered trademarks of their respective holders and should be noted as such.