New & Notable
Mobile security News
March 17, 2022
Cisco's MV Sense is available as a subscription with Meraki MV cameras. Companies can use the service to count boxes in a warehouse or track equipment on a factory floor.
March 04, 2022
HP's SaaS product lets businesses using HTC and Pico virtual reality headsets track device locations, push application updates, patch devices and set security policies.
February 28, 2020
The announcement of Microsoft antivirus software Defender on Android and iOS caused some puzzlement, but experts said the move recognizes the current security landscape.
January 23, 2020
Intercept X for Mobile is compatible with iOS and Android devices, as well as Chrome OS and Chromebooks. It offers privacy protection, authentication and other security features.
Mobile security Get Started
Bring yourself up to speed with our introductory content
The consumerization of IT refers to how software and hardware products designed for personal use migrated into the enterprise and were used for work purposes. Continue Reading
Cisco Identity Services Engine (ISE) is a security policy management platform that provides secure network access to users and devices. Continue Reading
Remote Procedure Call over HTTP (RPC over HTTP) is a Microsoft protocol that enables Microsoft Outlook clients to access Microsoft Exchange servers over HTTP. Continue Reading
Evaluate Mobile security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Mobile phishing is a significant threat, and there are many statistics that back this up. Find out what these numbers mean and how they should affect mobile security strategy. Continue Reading
Desktop security products often cannot cover mobile devices enough. Mobile threat defense can come into the picture and supplement an organization's mobile security. Continue Reading
Mobile devices are established as valuable enterprise endpoints, but organizations must take a measured approach and build out a strong security policy before deploying them. Continue Reading
Manage Mobile security
Learn to apply best practices and optimize your operations.
IT professionals should be aware of how to sideload iOS applications and why it might be dangerous and inadvisable to do so. Learn the two most common sideload methods below. Continue Reading
Text phishing, or smishing, is an increasing occurrence across enterprises. However, IT can neutralize this threat with the right policies and practices. Continue Reading
Phishing emails often get IT teams' attention, but text-based phishing is a growing threat. Organizations must understand the risks of mobile phishing and how to prevent it. Continue Reading
Problem Solve Mobile security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
A BYOD model offers convenience and flexibility, but it also creates security concerns. Here are the key mobile BYOD security risks that IT should consider and how to manage them. Continue Reading
The FIDO2 standard can help organizations go passwordless, but IT should understand how exactly an application or website offers this possibility through the WebAuthn API. Continue Reading
Android is just as secure as its competitors' OSes, but IT should still remain vigilant. Here are three ways to secure Android devices for the enterprise. Continue Reading