The Endpoint Imperative: The Perimeter is Dead; Long Live the Perimeter!

Cloud Musings

The result: Higher productivity, but bigger challenges for security, data protection, and mobile device management. Jackson and Intel’s Yasser Rasheed explore the new normal for security, with a focus on the end users.

Intel 182

The BYOD Problem

Cloud Musings

Everyone wants their device of choice right there next to them 24/7. To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. The process should also concurrently configure the newly enrolled device.

Mobile 141

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform

CTOvision

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform. Fixmo SafeZone for Knox is the first cross-platform secure workspace solution to be fully managed by Samsung’s new Enterprise Mobility Management (EMM) system. “We

Mobile 137

How to Choose the Best Vulnerability Scanning Tool for Your Business

Galido

Information Technology Blog - - How to Choose the Best Vulnerability Scanning Tool for Your Business - Information Technology Blog. After all, it’s all for the security of your business! Networking Security

How the CIO Can Establish a BYOD Usage Policy

CIO Dashboard

If you’re grappling with putting policies and procedures in place to manage the consumer-driven transition to a bring-your-own-device workplace (BYOD), don’t worry. Do I have the right to wipe the data with a mobile management system that I require employees to install?