Session border controllers used to control VoIP traffic can also be employed to secure BYOD devices, argues Zeus Kerravala, founder and principal analyst with ZK Research.
Barely two weeks after the revelation of a critical vulnerability in the widely-used OpenSSL library, and active exploits by hackers have already been observed being conducted against businesses.
Fifty-one percent of organizations have an enterprisewide mobility strategy in place with clearly defined initiatives, while 49 percent do not, finds an Illuminas survey, commissioned by Cisco. The survey polled 400 mid-market and enterprise-IT decision makers.
An Android vulnerability could enable an attacker to bypass a secure virtual private network connection and divert traffic from the Android device to a system controlled by the attacker, according to researchers at Ben-Gurion University's Cyber Security Labs in Israel.
Need help assessing the strengths and weaknesses of commercial mobility platforms for your enterprise but can't bear the expense of hiring a consultant or purchasing a pricey analyst report? Look no further than our friends across the pond.
Connectify Switchboard Personal Edition is a nifty app that installs on a home PC or OS X computer to provide a personal VPN service for secure Internet access--for traveling or on-the-go.
Security researchers from Group-IB have identified a malware created for the purpose of stealing login credentials from software used for online stock trading.
In order to help Internet users circumvent government firewalls and restriction of Internet usage, PhD student Daiyuu Nobori created VPN Gate, a free virtual private network service designed to be easy to use.
Unified communications (UC) provider Avaya has unveiled a new enterprise session border controller (SBC) designed to beef up collaboration security for remote and mobile workers.
With BYOD well-established at many companies, it's time for those IT organizations to start making strategic decisions about how to manage and secure information on user-owned devices, writes Galen Gruman at InfoWorld.