Laptop & Mobile Device Network Security

Sorted by:  

Mobile Device Security Challenges for Cloud Computing

With an increasing number of mobile device applications being developed or used within the corporate workplace, the economics of cloud computing are beginning to resonate with enterprises. It has become [more…]

Mobile Device Security Policy Updating

To keep up with the current mobile device security environment, you need to update your enterprise's mobility policies as well as think about supporting more than one device platform. Here are some of [more…]

Overview of Mobile Device User Authentication

The most fundamental requirement to allowing secure mobile devices within the enterprise is to have a solution in place to authenticate the users of those devices. It is common to use the following methods [more…]

Overview of User Data Access via Mobile Devices

Once users authenticate successfully from secure mobile devices, allow them to access only the corporate data or applications that you want them to. You may not want all users to be able to access any [more…]

Overview of Mobile Device Security VPN Policy Integration

If you allow your mobile device users VPN access to the corporate network, you likely already have a security policy in place that describes what types of users are allowed access, including the applications [more…]

Overview of Data Connections and Mobile Device Security

It is increasingly common for sensitive corporate data to be stored directly on mobile devices. That means that your security deployment needs to have the capability to protect devices accessing corporate [more…]

Basic Mobile Device Applications and Security

Variables that will impact your mobile device security strategy include the applications running on these devices. Each type of application comes with its own set of security concerns, such as the ability [more…]

Security Planning Overview: Mobile Devices on Your Network

You need to take many factors into account when planning your mobile device security deployment. Because this solution spans multiple types of technology, you need to properly plan every piece of the process [more…]

Scope of the Mobile Device Security Threat

Smartphones are just one type of mobile device that may show up in the workplace and therefore becomes a mobile device security concern. The mere presence of mobile devices in the enterprise is not the [more…]

Mobile Device Security Challenges for Enterprise E-mail

Mobile device security for the enterprise is essential because smartphone users can now easily access corporate e-mail. Employees are using these devices not just to check e-mail but also to check the [more…]

Overview of Mobile Device Security thru Cloud-based Protections

Using cloud-based endpoint security is one method of protecting enterprise mobile devices from viruses, malware, spam, and other threats. The actual threat protection happens in the cloud or centralized [more…]

Overview of Mobile Device Security thru Configuration and Application Management

After you’ve considered how you can secure the mobile devices on your corporate network from viruses and malware, you need to plan for remotely enforcing policies for device management and security. Remote [more…]

Overview of Mobile Device Security thru Device Management

Now that you’ve thought about securing the mobile devices on your network from threats like viruses and malware, it’s time to plan for remotely enforcing policies for device management or security. [more…]

The Importance of Enforceable Mobile Device Security Policies

Before you get into the nitty-gritty of the various components of mobile device security policies for your enterprise, it is important to understand the need for them. If every one of your users were an [more…]

Overview of Mobile Device Security thru Client-based Applications

Using client-based endpoint security is one method of protecting mobile devices from malware. Protecting your corporate data and network begins with protecting its connecting devices. In this solution [more…]

Enterprise Mobile Device Management Over the Air

One of the most important elements of any mobile device security management product is the ability to manage devices over the air (OTA). Given the mobile nature of these devices, no strategy would be successful [more…]

Enterprise Mobile Device Initial Provisioning Workflow

Understanding the processes of initial provisioning and ongoing management of an enterprise mobile device is important because of security policy implications. The processes described here are the most [more…]

Enterprise Mobile Device Password Policies

Just about every mobile device has the ability to set a password that is required to access any of the device's features, unfortunately this functionality almost always is turned off by default. You must [more…]

Data Encryption on Enterprise Mobile Devices

Encryption of data at rest, data that has been downloaded to and will be stored on the mobile device itself, is an important security policy to establish. Encrypting data prohibits someone from connecting [more…]

Enterprise Mobile Device Network Configuration Settings

Most mobile device management (MDM) solutions gives you control over network connections and the way that each enterprise mobile device connects to the corporate environment. Here are several ways that [more…]

Enterprise Mobile Device Function Restriction

There is a wide range of device functionality that you may want to control on your organization’s mobile devices in the interest of security. Not all of the following features are available in all mobile [more…]

Enterprise Mobile Devices and Exchange ActiveSync

Microsoft developed Exchange ActiveSync (EAS) as a synchronization protocol for Microsoft Exchange, but it has been adapted to include more mobile device security and management functionality. EAS is a [more…]

Enterprise Policies for Mobile Device Physical Protection

The policies for physical mobile device protection and security are mostly common sense – and yes, how uncommon is that? Yet these concepts bear repeating because your users take a lot of this for granted [more…]

Enterprise Security Policies for Mobile Device Backup and Restore

The storage of enterprise data and intellectual property on the mobile devices makes the ability to back up and quickly restore the devices to an operational state paramount. Both the critical tasks of [more…]

Communication of Enterprise Mobile Device Software Updating Policy

Regular provisioning policies should be used to change the software on enterprise mobile devices to keep them secure and up to date. When communicating with your users, you need to note that the software [more…]


Sign Up for RSS Feeds

Computers & Software