Posts Tagged ‘Mobile security’
MobileIron release Mobile Security and Risk Review – Third Edition
Welcome to the third edition of the Mobile Security and Risk Review. This bi-annual review provides IT security leaders with timely information about the mobile threat landscape and the emerging risks facing their organisations.
Read MoreFake Netflix app reads text messages and steals mobile files
Zscaler, the cloud security provider has discovered a fake app posing as the popular television service, Netflix. Zscaler discovered this malicious app on a third party app store and advises all users to only purchase form authorised Google play stores in the future.
Read MoreLookout network layer security expands mobile threat protection
Lookout, the global leader in securing mobility, today expanded Mobile Threat Protection with the introduction of Network Protection, an automatic on-device analysis of network connections to defend against man-in-the-middle attacks and ensure information is being securely transmitted.
Read MoreStormy weather? Cloud security and data encryption
Tim Compston, Features Editor at SecurityNewsDesk, looks at the key challenges for organisations when it comes to managing the rise of cloud applications in an increasingly mobile world.
Read MoreStrong authentication in the mobile world
Strong authentication in the mobile world Andrew Lintell, Director of Sales, Identity Assurance, EMEA at HID Global Emerging technologies, such as smartphones and cloud computing are increasingly enabling employees to access more applications remotely whilst on the move. With 72 percent of global businesses reporting that flexible working technologies such as smartphones, tablets and cloud computing…
Read More‘Risky Mobile Business’ revealed by Blancco Technology Group
‘Risky Mobile Business’ revealed by Blancco Technology Group Blancco Technology Group (BTG) have recently released a report which reveals that mobile users acknowledge the importance of security, but aren’t taking the right precautions. Some of the headline findings include: 29 percent of consumers don’t know when personal information has been accessed without their consent. One…
Read MoreLegal Technologies unveil 5 things stored on work devices
Legal Technologies unveil 5 things stored on work devices Legal Technologies – the corporate forensic investigation and e-disclosure firm, unveils the top five things employees have stored on their smartphones, revealing the dark side of Bring Your Own Device (BYOD). Proven Legal Technologies’ exercise involved the purchase of four random smartphones from eBay – each…
Read MoreHoneywell lineup at Intersec 2014 demonstrates technology solutions that deliver more
Honeywell (NYSE:HON) has announced the key technology trends including cloud based solutions, the rapid proliferation of mobile devices, and easier system integration reflected in the new products and solutions that will be showcased at Intersec 2014, taking place at the Dubai International Convention and Exhibition Centre from January 19th – 21st (Honeywell stand #: Stand 4-505C).…
Read MoreESET named ‘Best Endpoint Security Vendor’ at Reseller Hot 50 awards
ESET®, the global leader in proactive digital protection with a record of 10 years consecutive VB100 awards for its award-winning ESET NOD32® technology, has been named ‘Best Endpoint Security Vendor’ at the Reseller Hot 50 awards held in Dubai, UAE on the 4th of December, 2013. Reseller Middle East, a leading channel focused publication in…
Read MoreFree trial of CommVault Edge solution
CommVault (NASDAQ: CVLT) has announced a free trial of CommVault Edge, an enterprise-class solution for endpoint data protection, search and access. The downloadable software trial allows enterprises to experience end user access without requiring additional infrastructure, as all user data is backed up to the CommVault Cloud free of charge. The complete CommVault Edge solution…
Read More