Enterprise mobile security
Mobile security is the protection of smartphones, tablets, laptops and other portable computing devices, and the networks they connect to, from threats and vulnerabilities associated with wireless computing. Mobile security is also known as wireless security.. See complete definition.
Top Stories
-
Feature
06 Dec 2022
Wireless security: WEP, WPA, WPA2 and WPA3 differences
As wireless networks have evolved, so have the protocols for securing them. Get an overview of WLAN security standards, and learn the differences among WEP, WPA, WPA2 and WPA3. Continue Reading
-
Feature
08 Nov 2022
How to build a shadow IT policy to reduce risks, with template
With a shadow IT policy in place, organizations reduce security risks from unapproved applications and services that employees introduce independently. Continue Reading
-
Tip
04 Jan 2022
3 BYOD security risks and how to prevent them
A BYOD model offers convenience and flexibility, but it also creates security concerns. Here are the key mobile BYOD security risks that IT should consider and how to manage them. Continue Reading
-
News
18 Nov 2021
Apple launches SMB device management
Designed for companies of up to 500 employees, Business Essentials offers tools to download apps and push updates to iPhones, iPads and Macs. It provides up to 2 TB iCloud storage. Continue Reading
-
Tip
07 Oct 2021
6 dangers of shadow IT and how to avoid them
When employees use unapproved devices and software, they create information security vulnerabilities. Here's a look at some of those risks and how IT can prevent them. Continue Reading
-
Tip
20 Jul 2021
An introductory guide to mobile app security testing
Secure mobile apps by engineering security right into the software and with thorough mobile app security testing. Here's what risks to look for, processes to use and tools to adopt. Continue Reading
-
Tip
16 Jul 2021
How to deploy a mobile threat defense app in 3 scenarios
The mobile threat defense integration and application deployment process differ depending on whether an organization uses MDM, MAM or neither. Continue Reading
-
Tip
14 Jul 2021
Determining the best mobile threat defense options
Desktop security products often cannot cover mobile devices enough. Mobile threat defense can come into the picture and supplement an organization's mobile security. Continue Reading
-
Answer
12 Jul 2021
How to integrate mobile threat defense and UEM such as Intune
Mobile admins can use mobile threat defense integrations with UEM to provide deeper visibility into the threat level of mobile devices and additional security controls. Continue Reading
-
Tip
11 May 2021
Top 4 mobile security threats and challenges for businesses
Mobile devices are a target for hackers, with multiple ways to steal data. These threats -- from network spoofing to phishing texts -- endanger companies as much as individuals. Continue Reading
-
Feature
06 May 2021
Why a mobile security policy is a must-have corporate policy
A well-defined mobile device security policy that educates employees on the proper use of BYODs can help seal off vulnerabilities in corporate networks and bolster threat defense. Continue Reading
-
Feature
30 Apr 2021
7 mobile device security best practices for businesses
Organizations can't deploy mobile devices without accounting for their security. IT admins should follow these 7 best practices to manage mobile device and data security. Continue Reading
-
Tip
01 Apr 2021
5 endpoint security best practices to keep company data safe
With an expanding company perimeter, it's time to implement these endpoint security best practices, from asset discovery to device profiling. Continue Reading
-
News
24 Feb 2021
Google to release Android password check, messaging features
Google plans to release the latest features for the Android OS gradually. The updates include password checking, text message scheduling and better message dictation. Continue Reading
-
News
04 Dec 2020
Google launching basic Android device management
Google's Android Enterprise Essentials will let small businesses add necessary security to their Android devices without the complexity of more advanced management products. Continue Reading
-
Tip
12 Nov 2020
4 mobile app security threats all developers must face
Mobile apps carry their own set of code-based vulnerabilities and entry points, meaning developers need to step up their secure development, coding and deployment practices. Continue Reading
-
Tip
09 Oct 2020
Learn 5 Microsoft Intune security features for mobile admins
Intune admins must be familiar with all the most essential security features that the platform offers. Learn about features such as conditional access and MTD integrations below. Continue Reading
-
News
19 Jun 2020
Microsoft Authenticator for Android update adds options
This month's Microsoft Authenticator for Android update allows users to check their recent account activity and change passwords within the password management app. Continue Reading
-
Tip
29 May 2020
4 types of mobile security models and how they work
Learn about the different mobile security models that organizations can choose from and how vendors combine cloud-based threat defense with on-device security. Continue Reading
-
Answer
21 May 2020
Should IT consider NIAP-certified products for MDM?
The average organization may not require military-grade security for its endpoint management platform, but IT pros should take note of which products meet that standard. Continue Reading
-
Feature
06 May 2020
IT needs durable remote work strategy to keep employees home
After the initial rush, IT admins are now faced with how to keep remote work going. Continue Reading
-
Opinion
25 Mar 2020
How zero-trust authentication and architecture have evolved
Zero-trust architecture has spread across the enterprise security software market, so IT pros should understand the latest advancements in zero-trust authentication. Continue Reading
-
Opinion
25 Mar 2020
A look at MTD vendor Zimperium, and their new product suite, MAPS
Zimperium's MAPS provide organizations with a way to protect apps from development to after it hits app stores. Continue Reading
-
Tip
20 Mar 2020
5 strategic steps to blunt mobile device security threats
Companies need to evaluate their own needs and implement a viable mobile security strategy that's part of an overall corporate security plan. Their future may depend on it. Continue Reading
-
Opinion
19 Mar 2020
What IT needs to know about FIDO2 iOS and Android standards
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API. Continue Reading
-
Tip
10 Mar 2020
5G network slicing security benefits IoT, mobile
The fifth generation of mobile cellular technology offers a unique benefit its predecessors don't: network slicing. Learn more about these virtual slices and their security benefits. Continue Reading
-
News
04 Mar 2020
Enhanced BlackBerry Spark strives for zero-trust security
With a bolstered unified endpoint security layer, announced at last week's RSA Conference, BlackBerry Spark wants to bring zero-trust security to a broad swath of devices. Continue Reading
-
News
02 Mar 2020
New coronavirus wreaking havoc on tech conference calendar
As the coronavirus continues to spread, the organizers of some technology conferences have decided to alter or cancel their events for the safety of attendees. Continue Reading
-
News
28 Feb 2020
Microsoft antivirus software for Android, iOS a reflection of the times
The announcement of Microsoft antivirus software Defender on Android and iOS caused some puzzlement, but experts said the move recognizes the current security landscape. Continue Reading
-
Opinion
27 Feb 2020
What’s the deal with Microsoft Defender for Android and iOS?
AV in 2020 on a mobile device sure does sound funny, so what is it really? Continue Reading
-
Tip
21 Feb 2020
Compare web and mobile testing tools from AWS, Microsoft and Google
Compare and contrast the mobile testing tools from the big three cloud vendors -- AWS Device Farm, Google Firebase Test Lab and Microsoft Visual Studio App Center Test. Continue Reading
-
Tip
13 Feb 2020
Consider device attestation over MDM for specific use cases
As organizations consider running BYOD-style deployments, how to ensure devices are secure becomes a concern. Device attestation can provide IT assurance that devices are secure without management. Continue Reading
-
Opinion
13 Feb 2020
What did 2019 see for mobile security? More Punycode phishing, and jailbreaking returns
I previously spent several months examining 2018 in depth, so let’s see what the first couple of mobile security reports show for 2019. Continue Reading
-
Opinion
06 Feb 2020
A look at how Lookout integrates with Microsoft, Google, and VMware for unmanaged devices
Working with the likes of Microsoft, Google, and VMware is a coup for Lookout. Continue Reading
-
News
23 Jan 2020
Sophos adds mobile threat defense app to Intercept X line
Intercept X for Mobile is compatible with iOS and Android devices, as well as Chrome OS and Chromebooks. It offers privacy protection, authentication and other security features. Continue Reading
-
Opinion
16 Dec 2019
BlackBerry UEM is now in on zero trust, user behavior analytics, and mobile threat defense
A look at BlackBerry Intelligent Security, BlackBerry Enterprise Identity, and CylancePROTECT for Mobile. Continue Reading
-
News
11 Dec 2019
Mobile device security key trend in top 10 most read stories of 2019
Mobile devices provide productivity benefits but introduce security concerns, a delicate balance for IT pros that surfaces in this year's list of most read stories. Continue Reading
-
Tip
22 Nov 2019
The top 3 use cases for AI endpoint security tools
Endpoint attack surfaces are growing, and cybersecurity pros struggle to keep up. Consider the following use cases for AI endpoint security techniques in the enterprise. Continue Reading
-
Answer
21 Nov 2019
How can an enterprise mobile VPN fit into a mobility plan?
Organizations that need to secure mobile users and provide remote access to corporate resources should consider an on-premises or cloud-hosted mobile VPN to support mobile users. Continue Reading
-
Opinion
20 Nov 2019
What's the answer for 5G security?
Learn about the planning of 3GPP in developing specifications for 5G security in this synopsis of 5G Americas' white paper, 'The Evolution of Security in 5G.' Continue Reading
-
Answer
25 Oct 2019
How can the Samsung Knox Service Plugin help mobile admins?
The Knox Service Plugin helps Samsung smartphone admins roll out security features through EMM tools more quickly. The program lowers the programming burden for EMM vendors as well. Continue Reading
-
Tip
26 Sep 2019
Navigate Android encryption software from OEMs, EMM vendors
IT professionals can go beyond Android OS encryption to secure their mobile endpoints. OEMs such as Samsung and EMM vendors offer additional protections for Android smartphones. Continue Reading
-
Answer
18 Sep 2019
What native Android encryption options should IT consider?
Android encryption has evolved over the years, and full-disk encryption isn't an option in Android 10. IT must learn the best native encryption options for managed Android devices. Continue Reading
-
News
13 Sep 2019
New iPhone 11 features focus on consumers, not enterprises
Apple's new line of iPhones made headlines for better battery life and cameras, but it's the improved security features that will matter most to the enterprise. Continue Reading
-
Feature
12 Sep 2019
Latest iOS vulnerability puts mobile security in the spotlight
In this Q&A, sort through all the confusion regarding Google Project Zero's report on a major iOS vulnerability and determine how it should change your security policies. Continue Reading
-
Answer
11 Sep 2019
How does 802.11ax security benefit from WPA3?
Security methods like WPA3 and Opportunistic Wireless Encryption will give a boost to 802.11ax security, but securing the new wireless standard is still pretty complicated. Continue Reading
-
Tip
06 Sep 2019
Dangers of biometric authentication for mobile devices
Biometric authentication for mobile devices is touted for simplicity and security, but IT should be wary of particular biometric vulnerabilities and user privacy concerns. Continue Reading
-
Tip
05 Sep 2019
Mobile biometric authentication: The advantages and disadvantages
Mobile IT professionals must learn about the pros and cons of mobile biometric authentication before they implement fingerprint or face scan authentication factors. Continue Reading
-
Tip
22 Aug 2019
Key iOS enterprise security vulnerabilities IT should know
Mobile admins must approach Android and iOS security differently, because the two OSes face different threats. Learn how IT can mitigate iOS enterprise security concerns. Continue Reading
-
News
20 Aug 2019
KNOB attack puts all Bluetooth devices at risk
Security researchers discovered a way to force Bluetooth devices to use easy-to-crack encryption keys, which could lead to man-in-the-middle attacks and information leaks. Continue Reading
-
Tip
05 Aug 2019
Best mobile device security policy for loss or theft
When a user loses a mobile device, an organization's data may be at risk. IT should deploy specific security policies such as remote device wipes to protect its organization's data. Continue Reading
-
News
31 Jul 2019
Project Zero drops six iOS vulnerabilities ahead of Black Hat
Google Project Zero researchers disclosed six iOS vulnerabilities, including proof-of-concept code that could allow for attacks requiring no user interaction. Continue Reading
-
Tip
29 Jul 2019
Intro to iPhone encryption features for Apple admins
Encryption for iOS devices comes baked into the device itself, but iOS devices also have some significant enterprise-level protections that IT must enable and deploy policies for. Continue Reading
-
Opinion
16 Jul 2019
iOS 13 and Android Q show mobile OSes handle security, privacy issues better than Windows used to
Apple and Google can lock down their operating systems with much more ease than Windows. This makes our lives easier (most of the time!). Continue Reading
-
Tip
11 Jul 2019
Pros and cons of smartphone sensor data analysis
With the help of smartphone sensor data, IT can learn about its users' behaviors and improve operations and workflows, but collecting this data has some notable risks as well. Continue Reading
-
Feature
10 Jul 2019
Identity management strategy starts with people, not technology
Organizations have the tough job of creating an overarching view of identity inside and out of the company. One thing they should remember? Focus on people rather than technology. Continue Reading
-
Feature
10 Jul 2019
How mobile threat defense integrates with and improves UEM
Though many organizations have either UEM or EMM, mobile threat defense tools aren't as widely adopted. IT can improve mobile security with these tools' monitoring and policies. Continue Reading
-
Tip
02 Jul 2019
Go beyond UEM security to prevent mobile attacks
UEM tools provide a baseline of mobile security functions, but to prevent mobile attacks, IT should add a mobile threat defense tool to its security repertoire. Continue Reading
-
News
01 Jul 2019
IAM market evolves, but at a cost
At a recent security and identity conference, attendees discussed the IAM market in clear terms: Shiny new features might be cool, but practicality reigns. Continue Reading
-
Feature
28 Jun 2019
Identity access management at a crossroads
In this Q&A, Ping Identity CEO Andre Durand explains why identity management is being subsumed by security and how AI and automation will modernize identity management systems. Continue Reading
-
Tip
28 Jun 2019
How to beef up Office 365 email security features
Companies looking to fortify their Office 365 email security can assess options from a variety of third-party vendors. Find out which features are the most important. Continue Reading
-
Feature
28 Jun 2019
Hybrid identity management could be a method to the madness
IT departments planning to undergo a hybrid cloud migration need to think through how they're going to provide flexible and secure identity and access management to employees. Continue Reading
-
Tip
25 Jun 2019
Smishing targets mobile users and IT must prepare to fight it
Phishing attacks via SMS target are harder for IT to defend against than email phishing, but with the proper SMS-specific training and testing IT can improve its phishing security. Continue Reading
-
Answer
19 Jun 2019
What can IT do to enhance Android security?
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the enterprise. Continue Reading
-
Feature
18 Jun 2019
Cloud, SaaS bring identity and access management challenges
In this Q&A, Identity Automation's co-founder and CEO, James Litton, talks about the identity and access management challenges and the effects of cloud services in the IAM market. Continue Reading
-
Tip
10 Jun 2019
How mobile threat defense tools can help mobile admins
Mobile threat defense tools can significantly improve an organization's mobile security. Learn how these tools are different, what they can do and the market's leading vendors. Continue Reading
-
Answer
17 May 2019
How can biometric authentication improve mobile security?
A strong mobile authentication strategy should include a biometric factor, and IT should consider implementing such a factor into a multifactor authentication process. Continue Reading
-
News
13 May 2019
New MobileIron zero-trust security platform launches
MobileIron launched its zero-trust security platform, so customers could use their mobile phones as secure IDs. This would eliminate the need for passwords. Continue Reading
-
Feature
30 Apr 2019
4 identity and access management trends shaping the market
Identity technologies are evolving, but IT administrators still need to catch up. Here are the top four identity and access management trends shaping the market right now. Continue Reading
-
Opinion
16 Apr 2019
Conditional access (zero trust) is the most important EUC movement since mobile and cloud
How do we put together the “any-any-any” message we’ve been hearing for years? With access policies that take the device, user, app, risks, and other factors into account. Continue Reading
-
Quiz
15 Apr 2019
Mobile authentication best practices quiz for IT pros
IT pros can secure mobile endpoints with the right mobile authentication best practices, but they must know about new technologies and use cases to enforce them properly. Continue Reading
-
Tip
05 Apr 2019
Benefits of mobile passwordless authentication
With an authentication method for mobile devices that goes beyond password and username credentials, IT can prevent social engineering attacks, while maintaining device usability. Continue Reading
-
Feature
04 Apr 2019
Tackle mobile device authentication with modern methods
Mobile user authentication should require more than a password. New technologies enable authentication methods that IT should consider for its mobile deployment. Continue Reading
-
Tip
28 Mar 2019
Benefits of direct autonomous authentication for mobile
Direct autonomous authentication, a new mobile technology, authenticates users with mobile carrier technology faster than typical two-factor authentication methods. Continue Reading
-
Tip
25 Mar 2019
Unified endpoint management tools enrich the user experience
A well-conceived and well-executed UEM strategy that prioritizes UX can improve cross-platform capabilities, system access and ultimately worker productivity. Continue Reading
-
Tip
25 Mar 2019
Use Android Enterprise to lock down mobile devices
IT can integrate Android controls with EMM tools via APIs from Google's Android Enterprise program. These EMM capabilities can help IT manage updates and secure devices. Continue Reading
-
Tip
18 Mar 2019
Key Android Enterprise security controls for mobile admins
Mobile device admins should take advantage of Android Enterprise's security configurations to prevent threats such as data leakage and hackers bypassing authentication. Continue Reading
-
Tutorial
26 Feb 2019
Set up users with key PowerShell Active Directory commands
User management in Active Directory doesn't have to fill you with click-induced anxiety. Try these PowerShell tips for a more efficient way to get this work done. Continue Reading
-
Opinion
25 Feb 2019
What we learned about mobile security from real-world mobile threat defense customer data
Malware installs remain low, sideloading is surprisingly high, everyone agrees phishing is a threat, but there’s little consensus on network threats. Continue Reading
-
Tip
22 Feb 2019
Pros, cons of cloud-based IAM from Google, IBM, Amazon
Amazon, Google and IBM all provide IAM tools with a cloud subscription. But before IT commits, it's important to evaluate the pros and cons of these free services. Continue Reading
-
Feature
20 Feb 2019
4 mobile security best practices for enterprise IT
Organizations should look to update their mobile security best practices due to COVID-19. IT must incorporate BYOD access to corporate data and other new mobile capabilities. Continue Reading
-
Opinion
18 Feb 2019
Zimperium mobile threat data shows malware is a worry but still impacts few devices
Zimperium found that the greatest share of mobile threats is device based. Continue Reading
-
Tip
15 Feb 2019
Know when to allow mobile device backup
Mobile devices enrolled in MDM platforms should only be backed up in certain situations. Here's a rundown of what IT should allow in COPE, BYOD and COBO scenarios. Continue Reading
-
Answer
04 Feb 2019
How can IT prevent mobile cryptojacking on devices?
While most mobile platforms provide levels of security from mobile cryptojacking, IT must still be aware of the risks and procedures to address an attack. Continue Reading
-
News
28 Jan 2019
Amazon WorkLink aims to simplify secure mobile device access
Amazon WorkLink enables users to access behind-the-firewall content with their mobile devices and helps eliminate cumbersome VPN and mobile device management setups. Continue Reading
-
Answer
25 Jan 2019
What should IT look for in a mobile threat defense tool?
IT pros should consider using tools that can defend against mobile threats. The right tool should defend against malware, uncover compliance issues and expose shadow IT. Continue Reading
-
Feature
21 Jan 2019
Government shutdown raises end-user security risks
The government shutdown could be a boon for hackers, as end-user resources are a prime attack vector. An expert explains what IT should be on the lookout for. Continue Reading
-
Answer
18 Dec 2018
What is Project Verify and how will it affect IT?
Project Verify will enable mobile users to sign into apps and websites without login credentials. Discover what this might mean for IT and how it will work. Continue Reading
-
Answer
12 Dec 2018
How can IT address mobile device security risks?
Mobile threat defense, when paired with EMM, can enhance a security strategy. Here's why an on-device security platform is necessary for today's mobile threat landscape. Continue Reading
-
Opinion
11 Dec 2018
Wandera mobile security data shows locked-down corporate policies help lessen risk
It’s important to contextualize all the data to ensure everyone understands and doesn’t just try to dunk on one another. Continue Reading
-
Tip
10 Dec 2018
How mobile threat defense can complement EMM
MTD adoption isn't widespread yet, but IT admins would do well to stay ahead of the game. Here's how MTD can work in conjunction with EMM to secure devices. Continue Reading
-
Opinion
05 Dec 2018
Why identity management matters to mobility engineers
The next phase of your career can be paved by identity and access management. Continue Reading
-
Opinion
27 Nov 2018
How bad are mobile security threats? Our look at the numbers starts with Google and Lookout
Every vendor or company publishing mobile security data has an angle; let’s ditch that and just look at the numbers. Continue Reading
-
Answer
14 Nov 2018
What are the CIS benchmarks for iOS security?
Devices are only as secure as end users enable them to be. Here's how IT can use CIS benchmarks to enforce strong iOS security standards across an organization. Continue Reading
-
Opinion
25 Oct 2018
How to plan your mobile threat defense deployment
Practical advice on how to layer a mobile threat defense solution on top of your EMM, for single purpose, COPE, and BYOD devices. Continue Reading
-
Tutorial
10 Oct 2018
How to manage Active Directory groups with 7 PowerShell commands
Managing users, devices and other resources with Active Directory doesn't always require a GUI tool. Try PowerShell to streamline some of your administrative workload. Continue Reading
-
News
10 Oct 2018
IT must beware Apple DEP issues with authentication
IT admins can expose an organization to a variety of threats while using Apple DEP if they're not careful. But there are ways to sidestep a DEP security issue that could be problematic. Continue Reading
-
Tip
05 Oct 2018
How to implement a mobile app blacklist
Mobile apps aren't always safe, but IT can ensure that end users err of the side of caution with a blacklist. It's simple to create and maintain one with these steps. Continue Reading
-
Tip
03 Oct 2018
How to develop a mobile incident response plan
Mobile devices are often overlooked when it comes to an incident response plan, but they shouldn't be. Here's how to integrate mobile devices into an essential security system. Continue Reading
-
Answer
26 Sep 2018
Android Trojan: How is data being stolen from messaging apps?
Trustlook Labs discovered an Android Trojan stealing data from messaging apps. Learn what mobile security pros should look for to detect this malware with expert Nick Lewis. Continue Reading
-
Opinion
25 Sep 2018
Intune Win32 app management & more EUC news from Microsoft Ignite 2018
Here are more end user computing announcements that caught our attention at Microsoft Ignite, including Desktop App Assure and new AutoPilot features. Continue Reading
-
Opinion
11 Sep 2018
“Workflow” apps are a way to do mobile app security for SaaS
Where MDM isn’t possible, building workflows into other enterprise apps gives us a hook for security and management policies. Continue Reading