Endpoint device management: Protecting the enterprise front door

Cloud Musings

According to Bill Odell, the Dell Vice President of Marketing for Endpoint Device Management , you need to protect the enterprise front door. Since devices are the network’s gateways, endpoint device management is now the key to protecting your enterprise data. Bill Odell, VP of Endpoint Device Management marketing Kevin Jackson: Bill, I am really honored to get some time on your schedule today. I run marketing for Dell end-point device management.

New Android malware could damage phones

IT Manager Daily

A new malware strain could cause some headaches for Android users. Loapi also fights any attempt to revoke device manager permissions. If the user tries to take away the permissions, the app will lock the screen and close the window with device manager settings. The post New Android malware could damage phones appeared first on IT Manager Daily. In this week's e-newsletter IT Security Android hackers malware smartphones

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Read This If You Do Business in China

SecureWorld News

But the bank left out a critical detail about the software: it included malware.". Now, the Federal Bureau of Investigations (FBI) is jumping on the concerns surrounding this Chinese malware whack-a-mole. Featured Original Content Malware China

MIM ? For The Win - A Screw's Loose

A Screw's Loose

A few months ago I wrote a blogpost about how MDM (Mobile Device Management) had died. It was a slow painful death, but it was justified as it brought forth MAM (Mobile Application Management) and would lead to MIM (Mobile Information Management). I had been tweeting with Brian Reed , an amazingly smart person in the enterprise mobility management arena, and we seemed to be in violent disagreement. Policies shouldn’t be written in reference to devices.

RIP MDM 200X ? December 16th 2011 - A Screw's Loose

A Screw's Loose

Mobile Device Management (MDM) is dead and many hardly knew you. I truly never thought you would hang on this long but you really managed to stick it out. You were the savior for Bring Your Own Devices (BYOD). You know the parts, you were so good at finding a device, you could wipe a device like no one’s business, when you wanted someone to use a password, by golly they used one. Expense management. Malware. About.

Apple Unveils 'Lockdown Mode' to Defend Against Spyware

SecureWorld News

Turning on Lockdown Mode in iOS 16, iPadOS 16, and macOS Ventura further hardens device defenses and strictly limits certain functionalities, sharply reducing the attack surface that potentially could be exploited by highly targeted mercenary spyware.".

North Korean Threat Actors Targeting Healthcare Sector with Maui Ransomware

SecureWorld News

The figure below shows Maui command line usage details: The report continues: "Embedded usage instructions and the assessed use of a builder is common when there is an operational separation between developers and users of a malware family.

NASA Audit: Cyber Risk Skyrockets with 'Work from Home'

SecureWorld News

And the audit found that attackers did successfully introduce malware into agency systems. The Agency's cybersecurity challenges are further exacerbated by the number and variety of IT devices at NASA and the sheer volume of data the Agency maintains.".

BYOD can pose privacy risks to employees

Network World

Companies that use remote device management software to oversee employee devices used for business have the ability to collect a lot more information than employees may be comfortable with, according to a report released today. The intent of these MDM solutions is not to spy on employees, but to monitor for things like malware and general security," said Salim Hafid, product manager at Bitglass , which produced the report.

How to Choose the Best Vulnerability Scanning Tool for Your Business

Galido

To be noted is the fact that a vulnerability scanner is as important as a malware scanner today. While a malware scanner helps check for malware and clear them, the vulnerability scanning tool could help prevent malware threats and attacks. Some free vulnerability scanners provide scanning and remedial reporting while some of the advanced, feature-rich ones include components like patch management, penetration testing etc.

Security and Windows 10 Will Cross Paths for Enterprises

CTOvision

1 area of spending increase in 2015, with nearly half (46%) planning to invest more in access control, intrusion prevention, and virus and malware protection. Outside of the more notable and talked about features—friendlier UI, improved device manageability including MDM, easier operating system deployment (OSD), universal applications, and a customizable store portal for organizations—Windows 10 comes with something even more important - deeper security. By Deepak Kumar.

How to Speed Up a Low-End Windows 10 PC for Gaming

Galido

It not only affects your system performance negatively, but it also increases the chances of malware attack. Here, you get regular updates automatically from your device manufacturer that helps you update software. Here, you can ensure using the GPU management software that is set to automatically update. To update drivers on Windows 10 manually, follow these steps: Search & select Device Manager from the search box on the taskbar.

Penetration Testing Remote Workers

SecureWorld News

These include: Home personal networks, wired and wireless, including network reconnaissance and device inventorying. Devices owned by other companies that may be using the same network, wired or wireless, due to other family members working from home.

VOIP 81

The BYOD Problem

Cloud Musings

Everyone wants their device of choice right there next to them 24/7. To an employer, however, that smart device is nothing more than a dagger posed to rip apart every shred of corporate security. This reality of modern business was highlighted by the Information Security Community on LinkedIn through their 2016 Spotlight Report on “Bring Your Own Device” (BYOD). They also reinforce the burden of securing data, applications, and devices that is being placed on the employer.

Cloud 76

Chrome is getting a ton of big safety and security updates soon

The Verge

They’re needed: extensions are great, but they’ve always been a vector for malware. It will be turned off in Windows if parental controls are turned on, and it’ll also turn it off in cases where it sees enterprise device management policies.

The CTO made me do it - A Screw's Loose

A Screw's Loose

of course, the answer is no but you don’t have much of a choice now, his device has to be enabled. This is where true BYOD (Bring Your Own Device) began; enabling your executives to work on the new devices they had just bought. In the beginning it was easy, you enabled mail on the device through ActiveSync and you were done. That lasted until the App Store appeared and now you had to deal with actually managing the devices. Expense management.

Identify yourself for MIM - A Screw's Loose

A Screw's Loose

He was kind enough to place things like MDM (Mobile Device Management) and MAM (Mobile Application Management) in the diagram for us. I sent Gunnar a note after reading his post where I posited that we could replace identity in the middle of his venn diagram with MIM (Mobile Information Management). The advantage of MIM, is that data can now be passed from any one app on a device to another app on the device that can read the policy and follows the policy.

You saved how much? - A Screw's Loose

A Screw's Loose

As I wing off to another city this fine Monday morning, it seemed like the perfect time to talk about the economics of bring your own device (BYOD) and in this case we are talking mobile solutions. This whole concept kicked off a few years when an analyst house published a research report on how much money a company could save if they went from corporate liable (company owned) devices to personal liable (employee owned) devices. Expense management. Malware.

Herding Kangaroos - A Screw's Loose

A Screw's Loose

I spend a lot of time talking to EMM (Enterprise Mobility Management) vendors these days. Previously these were all MDM (Mobile Device Management) vendors, but as that acronym has started to lose some buzz they decided a name change is in order. The Consumerization of IT (CoIT) has led them to realize that they can’t keep selling businesses licenses to their product that will sit on the shelf unused due to the exorbitant control that IT would be exerting on a user’s device.

SAP 69

Sunburn - A Screw's Loose

A Screw's Loose

The first thing that they worry about is whether they can get their email, calendar, and contacts on their device. The first bit of pushback always concerns logging into the device. Most organizations require that users put a passcode on their device. It is the first line of defense for most devices, a casual user can’t log into it if they find it, and for many devices, it is what kickstarts the encryption process. Expense management. Malware.