BYOD articles

Check Point teams with Microsoft Intune to Secure Enterprise Mobility

Check Point teams with Microsoft Intune to Secure Enterprise Mobility

Check Point Software announced its product integration of Check Point SandBlast Mobile with Microsoft Enterprise Mobility + Security (EMS) to secure mobile devices in the enterprise. Cyberattacks have evolved beyond the enterprise perimeter, breaching mobile environments; yet only one percent of enterprises have deployed mobile security technologies. The integration of Check Point SandBlast Mobile, the market-leading

Trend Micro and VMware Collaborate to Enhance Enterprise Mobile Security

Trend Micro Joins the VMware Mobile Security Alliance and Integrates Its Mobile Security for Enterprise Solution with VMware Workspace ONE and VMware AirWatch. As mobile security threats continue to grow, from 2 million unique threats in 2014 to 34 million unique threats so far in 2017, IT leaders are confronted with the challenge of managing

Aadhaar Integration Now Available on Skype Lite

In February at Future Decoded India, Microsoft launched Skype Lite, thier fastest and smallest app to date built for the Indian market. They announced the Aadhaar integration within Skype Lite would be coming in the summer of 2017 and confirmed the availability of Indian users. Aadhaar is considered to be the world’s largest national identification

Rukus Brings Affordable, High-Performance Wi-Fi to the Hospitality Market

RUCKUS, a part of BROCADE, today announced its fourth generation wall-mounted access point (AP) designed to provide hotel guests with fast, reliable Wi-Fi. The RUCKUS H320 all-in-one AP and switch features the latest 802.11ac Wave 2 technology, enabling guests to simultaneously connect multiple devices to hotel Wi-Fi networks. The AP also allows property managers to

Half of U.S. businesses have no formal BYOD policy for security

Years after the widespread adoption of workplace smartphones, more than half of U.S. companies said they have no formal BYOD (bring your own device) policy to safeguard their enterprises, according to a survey. The survey of 447 businesses of all sizes was conducted over the summer by systems integrator Champion Solutions Group. It found that

Emerging Developer Opportunities in Enterprise Apps

Enterprise mobility such as BYOD, MDM, mobile SaaS and vertical app markets continue to grow at a tremendous pace. Given the scope of enterprise apps market, there are plenty of opportunities for the developers and channel partners as well. Read on to know more about them.   Apps are changing at the way professionals in

New Age Super-Secure Smart Phones

Most of us are unaware that a different class of super-secure smart phones are out in the US market for the security paranoid ones. What makes these smart-phones so secure? Let’s find out!   With the shocking revelation of Edward Snowden that the US and UK government officials had snooped communications links of high value

Most Secure Mobile Operating System

Which is the most secure mobile operating system? Is it Android – Knox, Blackberry BES, Apple’s iOS or Windows Phone? Let’s find out   Whether it is for personal privacy usage or secure business application and implementation, smart-devices such as smart-phone or tablets are used with in every walk of life. In every way, smart-phones

BYOD Policy: Balancing Security with the User Experience

With hands on practical experience, author in this article has shared some valuable suggestions and has addressed policy related issues also.   With the exponential growth of mobile smartphones, it is almost certain that an employee in an enterprise will have a smartphone in his pocket for sure when he or she enters the office. Can

Top