Please turn on your JavaScript for this page to function normally.
Avaya secures mobile collaboration and BYOD

Avaya Identity Engines 8.0 enables organizations to provide employees and guests with secure, controlled access to wired and wireless networks from their personal devices. …

Securing mobile apps in the enterprise

The mobile app has become the endpoint. With the advent of consumerization and BYOD, the number of managed devices began shrinking and that of unmanaged devices continues to …

ForeScout and Fiberlink fortify mobile security

ForeScout and Fiberlink announced a partnership to deliver an integrated MDM and NAC offering. The new product, ForeScout MDM powered by MaaS360, combines cloud-based mobile …

Identity as a Service platform for cloud service providers

Symplified announced Symplified Structure which enables telcos, cloud service providers, cloud application brokers, and cloud application hosting companies to seamlessly …

A basic shift in network defense

“In our industry, most of the companies we were working with have spent the the better part of the past ten years securing the perimeter of the network with intrusion …

Mobile security and identity management in the cloud

Executive-level security officers at some of the largest global companies have identified four main concerns for 2012: mobile device security, identity management for cloud …

Secure USB desktop environment for the enterprise

Imation announced the general availability of its ultra-secure StealthZONE PC-on-a-stick desktop environment to enterprise customers. Already used by national governments and …

Security monitoring for BYOD environments

Lancope showcased its solution for securing bring-your-own-device (BYOD) environments based on the company’s flow-based monitoring technology. Unlike other BYOD security …

BYOD is both an opportunity and a threat

A survey titled “What is your approach to BYOD – Love it? Hate it?” and conducted among 316 IT and security professionals set out to assess the opinions of …

Three BYOD problems that need to be solved

The Bring Your Own Device (BYOD) phenomenon has long stopped being just a fad and the option has become a crucial part of keeping employees and contractors happy and …

Portable encrypted Linux computing environment

SPYRUS announced a new version of Secure Pocket Drive that allows end users to build and distribute their own secure bootable Linux OS image. In addition to offering secure …

The next step in BYOD security

The explosion in development and adoption of smartphones and tablets for both personal and business use in the past two years is both a blessing and a curse to IT departments …

Don't miss

Cybersecurity news