Pulse Secure, a security spinoff of Juniper Networks, unveiled Tuesday at RSA its Pulse One central policy manager for remote access of mobile devices and PCs.
Session border controllers used to control VoIP traffic can also be employed to secure BYOD devices, argues Zeus Kerravala, founder and principal analyst with ZK Research.
Fifty-one percent of organizations have an enterprisewide mobility strategy in place with clearly defined initiatives, while 49 percent do not, finds an Illuminas survey, commissioned by Cisco. The survey polled 400 mid-market and enterprise-IT decision makers.
An Android vulnerability could enable an attacker to bypass a secure virtual private network connection and divert traffic from the Android device to a system controlled by the attacker, according to researchers at Ben-Gurion University's Cyber Security Labs in Israel.
Need help assessing the strengths and weaknesses of commercial mobility platforms for your enterprise but can't bear the expense of hiring a consultant or purchasing a pricey analyst report? Look no further than our friends across the pond.
With BYOD well-established at many companies, it's time for those IT organizations to start making strategic decisions about how to manage and secure information on user-owned devices, writes Galen Gruman at InfoWorld.
The current BlackBerry Enterprise Server 5 platform is incompatible with Blackberry 10 devices, and Research in Motion plans to cease development of the platform, according to a report by BGR.
In an interview with FierceCIO, Bill Dickerson, network security administrator, shared how he was able to implement remote access technology that enables his team of just six IT pros to support the agency's work.
On the premises that traditional firewalls are no longer adequate, five formal Cisco engineers have co-founded a start-up called Rohati Systems to offer more
Everyone is trying to pack lighter these days, so what are the odds you can convince your employees to add a wireless access