More enterprises are using selecting wiping of mobile devices as a way to protect corporate data while safeguarding employee privacy, according to a study by Fiberlink, IBM's mobile device management unit.
Containerization, which separates corporate and personal data on a BYOD device, is one approach that enterprises are taking to provide security in a BYOD environment. But is it the best approach to BYOD security?
The next 5-10 years will see a major upheaval and mobile digitization of the standard workflow for all companies, big and small. That upheaval will bring increased security risks.
While AT&T is often on the provider side of bring-your-own-device, the U.S. carrier has also undertaken a massive BYOD program within its own ranks. Through that process, the company learned a number of valuable lessons for enterprises implementing their own BYOD, Sundhar Annamalai, executive director of AT&T Advanced Mobility, told an audience here at the CITE Conference.
Cybercriminals are developing malware that is more targeted, stealthier and able to evade signature-based defenses, warns a new IDC report.
Good Technology has significantly enhanced its previous mobile security system for email and other apps by now including Good Dynamics AppKinetics to its existing platform.