Mobile Security Resources

Mobile Security news and support resources, featuring the hottest solutions, technologies and vendors in the Mobile Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

Home Tag "Mobile Security"

Ericom Connect and AccessPortal login with DUO Security

Ericom Software
Watch and learn: Configure the DUO Radius Proxy for use with Ericom Configure Ericom Connect to use DUO Security AccessPortal Login with DUO Testing the Push, Passcode, and Phone authentication factors This video is from the fine folks at Ericom Software

Citrix: The View from the Gartner Security & Risk Management Summit: Beyond Traditional Models and Vendors

Citrix Systems
With so much of the enterprise environment undergoing rapid transformation, why would security remain the same? It won’t, of course. At the recent Gartner Security & Risk Management Summit in National Harbor, attendees explored the changing face of cybersecurity, including key topics such as threat management and context–aware digital trust, enabling safer cloud computing, mobile […]

MTM Technologies, Inc. Launches AnywhereApp for Organizations in Need of Custom Cloud-Based Workspace Solutions

DABCC
Customizable Anytime, Anywhere Application Access at a Subscription Cost Model To meet the growing demand of mid-market and small enterprise businesses in need of customizable cloud-enabled digital workspaces, MTM Technologies, Inc. (“MTM”) today launched  AnywhereApp, the only fully supported workspace-as-a-service infrastructure designed to custom-fit a digital strategy, whether that’s cloud adoption, improving mobile security, or […]

VMware: How This Company Blocks Over 1,000 Mobile Security Threats Each Month

VMware
HomeService, a home assistance provider, was looking for an integrated mobile security solution to manage both devices and the associated data and keep security executives happy. Since deploying Wandera and VMware AirWatch, HomeServe has identified and blocked more than 1,000 potential mobile security threats every single month.Read their innovative mobile security case study here. “Without […]

Microsoft Video: Brad Anderson’s Lunch Break / s4 e6 / Simon Cheng, Lululemon – Part 2

Microsoft
In the second half of Brad’s conversation with Simon Cheng (Manager of Corporate Technology at Lululemon), they talk about how often he gets requests for discounts on Lululemon gear, as well as how Lululemon’s IT organization has structured its infrastructure to support the company’s culture and the needs of its workforce to operate in ways […]

Microsoft Video: Brad Anderson’s Lunch Break / s4 e2 / Andrew Wilson, CIO, Accenture – Part 2

Microsoft
In the second part of their conversation, Brad Anderson and Andrew Wilson (CIO, Accenture) talk about time-traveling humpback whales, how an organization as big as Accenture uses mobile and cloud-based security, and the guys play an intense game of “IT Would You Rather.” Andrew also shares some advice about how to look at mobile security […]

Citrix Collaborates with Samsung to Deliver Desktop Experience on Samsung Galaxy S8 with Samsung DeX

Citrix Systems
Preferred Solution Citrix Receiver Combined with Samsung DeX Enables Workforce to Convert Smartphone into Full-Functioning Desktop with Secure Access to Digital Workspace As enterprises increasingly embrace mobile business strategies, people continue to carry as many as three devices with them, including laptops, smartphones and tablets. To lighten that electronics load, make people more efficient and […]

VMware Expands Partnership with Samsung to Deliver Next Generation Unified Mobile and Desktop Experience to Solve Mobile Workforce Challenges

VMware
VMware Workspace ONE unifies mobile and desktop experiences for Samsung Galaxy S8 users by delivering mobile, cloud and Windows applications through an identity-defined digital workspace; VMware Horizon delivers true Windows desktop and applications computing experience on Samsung Galaxy S8 through the VMware digital workspace and Samsung Desktop Experience (DeX) VMware, Inc. (NYSE: VMW), a global […]

Managing and Securing Mobile Devices for Dummies E-Book

ManageEngine
Everything you need to know about managing and securing mobile devices Want to cultivate mobility in your organization without compromising data security? Check out this new e-book to find out how mobile device management (MDM) can help. To effectively manage your enterprise setup, it is important to understand the entire mobile landscape, including enterprise-owned and […]

Skycure / Citrix Ready – Mobile Security: Predict, Detect and Prevent Physical, Malware, Network and Vulnerabilities Podcast – Episode 269

DABCC Radio
Listen to “Skycure / Citrix Ready – Mobile Security: Predict, Detect and Prevent Physical, Malware, Network and Vulnerabilities Podcast – Episode 269” on Spreaker. In episode 269, Douglas Brown interviews Varun Kohli, Vice President of Marketing at Skycure and Shashidhar Reddy, Technical Marketing Lead for Citrix Ready.  Together we discusses the Skycure mobile security solution […]

VMware: Derived Credentials – What You Need to Know

VMware
I’ve been reading a lot recently on passwords. Are they dead? What new technology will replace passwords? Internally, we have been debating biometrics and its place in the enterprise. Someone even questioned if VMware owns my fingerprint once I store it on a company-issued phone. (For the record, no—but I still use my pinky, just in case.) Today, access […]

New VMware eBook! The 5 Next Big Things in Mobile Security

VMware
Strike down new attacks before they happen. Get a free copy of the new eBook from VMware to discover what’s next in mobile security. The state of cybersecurity is scary. Businesses have watched security breaches expose more than 851 million records in the last decade, and nearly 6.2 million records have been compromised since 2016 […]

VMware Trend Alert: The 5 Next Big Things in Mobile Security

VMware
No CIO wants to hear that their company has been hacked. But for most, network intrusion is the new reality—even if we don’t realize it. In the new eBook, 5 Next Big Things in Mobile Security, we explore the biggest trends and threats facing businesses of all sizes everywhere in the world. Access the free […]

Visit our Sponsors!

Close