Five key assumptions to make when considering mobility security
Imation's Jon Fielding sets out some key truths to consider when formulating security strategy
However you choose to roll out enterprise mobility, be it BYOD, COPE, CYOD, virtual desktops, Windows to Go USB sticks or any of the other myriad strategies, the thought processes and strategies around...
More on Mobile
Delta: Microsoft's identity management lead is under threat
Identity management underwent dramatic changes following the coronavirus pandemic - including the leading vendors' positions
Understanding the shared responsibility model for security in the hybrid cloud
If the responsibilities of CSP and customers are not well understood, the risks to security are obvious
UKIT Industry Awards 2020: Darktrace wins security innovation of the year
Dave Palmer, co-founder of Darktrace, discusses security risks to organisations, and describes how he felt when he heard that his organisation had won one of the coveted gongs at the UK IT Industry Awards 2020
How iboss' containers are revolutionising security
Security firm iboss is disrupting the traditional VPN approach and enabling customers to access applications directly
Mobility must-haves: the case for Unified Endpoint Management
What does a Unified Endpoint Management (UEM) platform need to be capable of today, and is a broader end-to-end service now a must-have for mobile workforces?