BlueBox Security: Serving the corporate world by securing mobile data

CTOvision

Bluebox Security is saving the corporate world from information thievery by securing company data as it interacts with employee mobile devices & services. Company Security Companies bluebox Mobile device

Mobile 205

Managing Mobile Business Insecurities

CTOvision

But with the escalation of smartphones, there is a proportionate security risk rise. Today about 75% of mobile apps fail the most basic security tests, and that number is probably going up not down. billion of mobile devices will have security applications installed.

Mobile 224

Creating Enterprise Data and Mobility Security

Data Center Knowledge

As more users utilize mobility, creating enterprise-ready data and mobile device security controls becomes critical. There are some inherent benefits to creating corporate mobility – productivity, worker happiness, less end-point management – but there are also many concerns.

Mobile 243

The CTOvision Mobile App: Enterprise content on any mobile device

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need.

Mobile 224

Mobilize The Internet Of Things

Forrester IT

The mobile mind shift requires businesses to proactively support these IoT benefits for nonstationary connected objects that exist as part of IoT solutions. In particular, the IoT forces businesses to acquaint themselves with the implications of mobility in the IoT context for connectivity, security, compliance with privacy and other regulations, and data management for mobility. This means that: Mobile technologies are central to most IoT solutions. Mobility.

Mobile 117

The Fight For Cybersecurity Brand Dominance Intensifies

Forrester IT

cybersecurity data security endpoint security IoT security managed security services providers (MSSPs) mobile security security & risk security automation & orchestration security operations & program governance endpoint detection and response IoT mobile Security & Risk

Mobile payments get Isaca’s security approval

Computer Weekly

Mobile contactless payments enable three key security controls that make them more secure than physical and e-commerce payments, according to a report by Isaca

Mobile 145

How CIOs Deal With Mobile Disruption

The Accidental Successful CIO

Mobile disruptions can happen at any time Image Credit. As CIO, because of the importance of information technology, you need to get ready to deal with the disruptions that that arrival of even more mobile technology is going to create. It’s All About Security.

Mobile 194

The CTOvision Mobile App: Tech news and context on any mobile device

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need.

Mobile 205

Should You Build in-house or Outsource Development of Your Mobile Apps?

CTOvision

Once an enterprise has decided to go down the path of building native mobile apps, there is one critical decision involved –whether to build these apps in-house or to outsource development. If mobile is key to future growth, it is best to produce in-house. Sunil Thomas.

Mobile 243

Both Sides of Enterprise Mobility

Cloud Musings

Photo credit: Shutterstock Enterprise mobility has become table stakes in the world of business. The familiarity we all have with smartphones and wireless access, actually obscures the true difficulty of developing and executing an effective corporate mobile strategy.

Mobile 179

MobileIron: Corporate IT policy and mobile device security are mismatched

Computer Weekly

MobileIron report identifies a gap between security policy and the actual deployment of that policy on mobile devices

BlackBerry ends production of mobile phones

Computer Weekly

Canadian firm to focus on a strategy built around software development, including security and applications, and mobile device management

Mobile 206

Thriving in a Cloud, Big Data, Mobility and Security World

Cloud Musings

Cloud/Client Computing - The convergence of cloud and mobile computing will continue to promote the growth of centrally coordinated applications that can be delivered to any device. Software-defined networking, storage, data centers and security are maturing.

Video From Samsung Knox Press Conference at Mobile World Congress 2014

CTOvision

At this link and embedded below is a video from Samsung which captures the new features of Samsung’s well engineered approach to enhancing mobile security. By Bob Gourley.

Mobile 238

Mobile-Flex: Transformative Technology that simplifies mobile technology

CTOvision

Mobile-Flex® is a Windows Based Server solution that delivers access to any Windows server application on mobile devices, Windows desktops, Surface and Macintosh computers in a safe and secure manner using our patent pending technology that leaves NO trace of data of any nature on the device. We do this by dynamically analyzing each graphical object of the Windows Presentation Manager (WPM) and turn it into compressed images which are sent to the Mobil.

Mobile 155

Why your CTO Makes or Breaks your Enterprise Mobile Strategy

CTOvision

Why your CTO Makes or Breaks your Enterprise Mobile Strategy. For consumers, mobile phone adoption has skyrocketed and smartphone ownership continues to climb in emerging economies. Plus, 90% of mobile users time is spent in apps. Scalability & Security. Sunil Thomas.

Mobile 174

Mobile C-level executives are major risk to business security

Computer Weekly

C-suite executives logging on to unsecured public Wi-Fi hotspots seem to present one of the biggest security risks to enterprise networks

Mobile 167

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform

CTOvision

Fixmo Announces Expanded Collaboration with Samsung, Enhanced Support for Samsung KNOX Secure Mobile Platform. Today at Mobile World Congress, Fixmo announces the expansion of its collaboration with Samsung, the world’s largest smartphone manufacturer.

Mobile 192

Look to over-the-top services to secure mobile, says specialist

Computer Weekly

Mobile network operators should look to 3G and 4G while enterprises should consider OTT services to provide the best security, says telecommunications industry veteran and pioneer Charles Brookson

Mobile device security: A new frontier for hackers

Cloud Musings

Recent security breaches have heightened our awareness of cybersecurity issues. The hack and other security breaches have resulted in unprecedented damages. However, the majority of mobile device users have yet to be sensitized to their personal and corporate security risks.

Mobile 204

DISA Announces DoD Mobility Capability Enhancements for Android/Samsung Knox

CTOvision

The following was just announced by the Defense Information Systems Agency (DISA): DISA ANNOUNCES DOD MOBILITY CAPABILITY, 2.0 The Defense Information Systems Agency (DISA), as the lead agency for the DOD Mobility Capability, implemented its 2.0 release for Android/Samsung Knox capability under the DOD Mobility Unclassified Capability (DMUC) […]. Cyber Security Government Mobile Android Bluetooth DISA KNOX Mobile Device Management samsung Samsung Galaxy S4 Wi-Fi

Mobile 172

SafeWatch Mobile Security Solution by @Fixmo Now in General Availability for Android and iOS

CTOvision

–(BUSINESS WIRE)–Fixmo, a leader in mobile security and data protection solutions, today announced the general availability of Fixmo SafeWatch, an innovative mobile privacy and security solution for consumers and business professionals using Android and iOS smartphones.

Mobile 193

How the CIO can Sleuth Mobile Systems

CIO Dashboard

The responsibility of conducting mobile forensic investigations in the workplace should fall in the lap of the Chief Information Security Officer (CISO). Fetching data from mobile devices is fraught with challenges not found in the more mature realm of personal computers.

Mobile 100

The New Mobile Enterprise Reality

The Investing Edge

The statistics don’t lie: 2013 was the year of mobile. More than two billion mobile devices were shipped globally last year. Global mobile traffic now accounts for 15 percent of all internet traffic. Indeed, the mobility theme is not just a consumer phenomenon.

Mobile 130

Cyber security a business necessity

Computer Weekly

Cyber security is a business necessity, according to the T-Mobile security chief in Poland

Mobile 204

The CTOvision Mobile App: Updated to include events plus tech news and videos

CTOvision

An upgrade for The CTOvision Mobile Application is available for iPhone , iPad and Android users. But we now include feeds from all other major tech blogs, letting you use our mobile app to track all the technology news, analysis and context you need. By Bob Gourley.

Mobile 209

Fixmo: The Mobile Risk Management Company

CTOvision

Company Mobile Companies Security Companies You''re unauthorized to view this page. Why don''t you Login and try again.

If Mobile Isn’t On Your Radar, It Should Be

CTOvision

Editor's note: In this post, AIIM ’s CEO John Mancini urges enterprises to take a serious look at mobile ECM as their window on content. -bg. Enterprises understand that there is a natural synergy between mobile services and mobile content. Yet despite this, many are being slow at putting effective mobile programs in place to satisfy the 24/7 connected business world. Only 10 percent of those interviewed said they thought they had a successful mobile program in place.

Mobile 202

Real World Mobility – Filling the Gaps

Eric D. Brown

I just finished reading through the Dimension Data Secure Enterprise Mobility Report.The report is a nice report on how modern organizations are thinking about and approaching strategic planning with mobility, BYOD and security in mind. Sponsored by Dimension Data.

Mobile 234

DISA Announces Initial Release v1.0 of DoD Unclassified Mobility Capability

CTOvision

By Bob Gourley Editor’s note: The release below from the Defense Information Systems Agency points to progress enabling several key DoD missions with mobility solutions. MEADE, Md. – The new year will bring new mobile capabilities to as many as 100,000 DOD users. of the unclassified mobility capability Jan. The program currently supports 1,800 unclassified mobile devices including iPad 3 and 4, iPhone 4S and 5, Samsung 10.1

Mobile 157

Seven Mobile Security Threats to Watch

IT Toolbox

Let’s start with a real-world reminder of why mobile security is important. This past May, HospitalGown was uncovered by mobile security firm, Appthority. Billed as the largest enterprise mobile data leak ever, the vulnerability exposed more than 21,000 backend app server that

Mobile 100

The Threat Brief Mobile App: Know the threat to beat the threat

CTOvision

Threat Brief Mobile App is now available for all Apple iOS and Android devices. To find it search for ThreatBrief in your favorite app store, or follow these links: The Threat Brief Mobile App For iOS . The Threat Brief Mobile App for Android. Bob Gourley.

Mobile 155

AirPatrol: Cognitive Mobility and Wireless Situational Awareness.

CTOvision

AirPatrol delivers the first intelligent enterprise mobility solution that continuously monitors mobile devices and dynamically adapts their capabilities for the situation. AirPatrol operates under the premise that in security location is everything. Company Cyber Security Mobile Security Companies AirPatrol mobile ZoneDefense

The CTOvision Mobile App: Track tech topics anywhere anytime on iOS and Android

CTOvision

The CTOvision Mobile application provides intuitive, interactive access to our content and easy ways to find and share the information you and your network need to know on enterprise tech. Here are the download sites for the CTOvision Mobile App: iPhone. Bob Gourley.

Mobile 148