As users increasingly use mobile devices and operate outside the traditional corporate network, the concept of "endpoint security" has to evolve. And so do your strategies to secure the endpoint from sophisticated adversaries such as advanced persistent threat.
Register for this webinar to learn more about:
End users are demanding their own devices in the workplace making IT the shepherds of a potentially unruly flock. The good news is IT can embrace BYOD with security and confidence given the right preparation and technology Whether you're supporting iOS, Android, BlackBerry or Windows, the rules of BYOD don't change....
Most businesses are confronting how to fully embrace mobile devices beyond their executive and sales teams. Users are choosing the Android and iPhone experience over the largely business-task-driven BlackBerry devices. They have also adopted application stores in their personal lives, blending activities like web...
Managing smartphones and tablets is only half the MDM story. Securing the data and access points between corporate systems and your workers' iOS, Android, Windows, and BlackBerry devices requires just as much consideration and planning as protecting the devices themselves.
This white paper highlights:
Intuit and GE veteran Steve Bennett, chairman of the IT security software provider, replaces Enrique Salem, the longtime Symantec executive who had served as the company chief executive officer since April 2009.
The draft guidelines recommend developing system threat models, instituting a mobile-device security policy, implementing and testing a prototype of the mobile-device solution and securing a device before allowing user access.
Many organizations aren't devoting enough resources to ensure that applications for mobile devices are secure, says security expert Jeff Williams. He offers five tips for adequately addressing mobile application security.
The Department of Veterans Affairs will not expand its use of iPads and iPhones until later this summer when an enterprisewide mobile device management system to monitor the devices and ensure security is implemented, says CIO Roger Baker.
Cloud services are being adopted increasingly by organizations. But with adoption comes increased concern, says Symantec's Francis deSouza. How can organizations deploy cloud security to protect their data?