Mobile security
Modern security tools can cover all sorts of devices, but mobile devices present threat vectors, privacy issues and security challenges that aren't common elsewhere. For example, device loss and theft can occur much easier with mobile devices than with PCs. Find out what considerations IT must consider when building a mobile security plan.
Top Stories
-
Feature
06 Jun 2025
How to choose and set up a mobile VPN for an Android phone
A tailored approach to network security is crucial when managing smartphones in the enterprise. IT teams should consider Android VPN options for their organization. Continue Reading
-
Feature
29 May 2025
How to choose and set up a mobile VPN for an iPhone
Many users perform work tasks on their iPhones, relying on mobile VPNs to securely access corporate resources. Learn about VPN options for iPhones and how to set up these systems. Continue Reading
-
Tip
31 Mar 2017
Evaluate the three EMM security options: MDM, MAM and MIM
There is more to EMM security than meets the eye. When it comes to safeguarding corporate devices, IT should consider all three EMM components: MAM, MDM and MIM. Continue Reading
-
Tip
21 Sep 2016
Why mobile two-factor authentication is better than biometrics
Two-factor authentication may not be perfect, but nothing is with security, and it is certainly more secure than any single-form factor method, including biometrics. Continue Reading
-
Tip
25 Jan 2016
Top five Android device management security challenges
Fragmentation and BYOD user behavior complicate Android device management, but new tools can help IT administrators improve application and data security. Continue Reading
-
News
14 May 2015
ShareFile steps up security with third-party DLP integration
Citrix ShareFile will allow for third-party DLP integration within its data zones, as IT shops look for a balance between ease of use and security. Continue Reading
By- Alyssa Provazza, Editorial Director
-
Tip
04 Nov 2014
Why mobile user authentication is more important than ever
Encrypting data is a good first step, but if you don't properly authenticate users, sensitive information can still fall into the wrong hands. Continue Reading
-
Opinion
10 Mar 2014
How mobile antivirus software works and how to know if you need it
Whether you require users to have mobile antivirus software on their devices depends on how much control you have and which devices workers use. Continue Reading
By -
Tip
20 Dec 2013
How to use smartphone security settings
Smartphone security settings such as passcodes, encryption and network controls can help users secure their mobile phones and protect corporate data. Continue Reading
By -
Tip
27 Mar 2013
How mobile device encryption works to protect sensitive data
Mobile device encryption -- of both the hardware and software varieties -- is one of the best ways to secure data on smartphones and tablets. Continue Reading
By- Lisa Phifer, Core Competence
-
News
25 Jul 2012
Active Directory deficient for consumerization-era identity management
As cloud and mobile take root in enterprises, identity management takes center stage and some say Active Directory isn’t enough. Continue Reading
By- James Furbush, TechTarget
-
Answer
28 Feb 2011
Can smartphones get viruses and spread them to the network?
Today's powerful smartphones can sometimes spread viruses to the corporate network. Learn how it can happen and how to prevent it. Continue Reading
By -
Tip
06 Oct 2010
How to secure GSM phones against cell phone eavesdropping
Every enterprise has mobile phones, and, due to a recent attack demonstrated by Chris Paget at Defcon, every enterprise is now open to the possibility of data theft or mobile DoS attacks. Learn more about the growing threats of cell network eavesdropping and spoofing. Continue Reading
By