The Complete Mobile Security Resource

What's Hot in Mobile Security

  • AVG Secures Personal Digital Items with Mobile App
    AVG Technologies is securing personal digital items, such as credit card details, official documents, pictures and private notes with its new free mobile application, AVG Vault.
  • Fujitsu Introduces New Power Appliance for SAP Adaptive Server Enterprise
    In today's business environment organizations can implement IT needs on premises or in the cloud. When it comes to storage, having an on premise solution with the right security protocol can ensure the protection of the organization's digital assets at a time when major security breaches are consistently making headline news. The new Fujitsu Server Power Appliance for SAP Adaptive Server Enterprise (Fujitsu Power Appliance for SAP ASE) is designed to provide this service by consolidating storage devices for data protection while at the same time saving energy and lowering total cost of storage.
  • Samsung & PayPal Turn to Nok Nok Labs for Authentication
    It's getting tougher to be a mobile device user these days. Seems like it's hard to turn around without running into a new threat to that device, and the information it contains. But for every new threat, it seems, there's a new countermeasure waiting to slap it down, and that seems to be what's going on with Samsung and PayPal, who have turned to Nok Nok Labs to provide a whole new kind of protective tool to help keep users safe when turning to mobile payment systems.
  • Forecast Sees Wireless Network Security Market Hitting $15.55B by 2019
    It has been said that the only thing you can ever really be sure of are death and taxes. Personally, I'm not really partial to either of those. However, there is something else that I have seen over the years that is just as reliable. Every time that wireless and mobile technology advances and we see faster speeds and greater connectivity, we immediately see the need for better and additional security.
  • Smartphone Thefts Nearly Double Between 2012 and 2013
    There's been a lot of talk lately over smartphone kill switches, and while right now the process appears to be a deal that's mostly done-the only real sticking point seems to be whether or not the kill switch should be mandatory or should be a function that can be selected by the user-the whole thing may seem a bit disingenuous. A new report from Consumer Reports, meanwhile, suggests that's actually a pretty big problem.
  • Mobile Security Week in Review
    Even a holiday week is a pretty big week when it comes to mobile security, and the attempts staged to wrongfully access a system still continue even in the face of Easter. With a weekend-a long one for some-now afoot, it's a good time to take a look at the biggest events of the week, and get a better handle on how those events relate to the larger field of mobile security as a whole. So settle in and put on another cup of coffee, because it's time for our Week in Review coverage!
  • New Support Emerges For Smartphone Anti-Theft Devices
    While the idea of the mandatory kill switch for smartphones being signed into law has proven at least somewhat controversial, the controversy may be about to boil right out of the concept. A shocking wave of new support has arisen for the smartphone kill switch, coming not only from several breeds of device maker, but also from the major carriers as well.
  • NT OBJECTives Delivers New Security Service, NTOMobile On-Demand Web Application Security Testing
    NT OBJECTives, Inc. is a provider of automated security testing software, services and Software as a Service (SaaS) for web applications. NTO's customizable suite of solutions includes application security testing, SaaS scanning and in-depth consulting services to help companies build the most comprehensive, efficient and accurate web application security program.
  • Mobile Security Week in Review
    It's been another big week in mobile security, as the eternal struggle between those who own mobile devices planning to use same without outside intrusion and those who want to intrude on mobile devices carrying on. New threats and new countermeasures have come up for consideration, but figuring out how it all fits into the grander scheme of things isn't always simple. With that in mind, and a weekend afoot, it's a great time for a look at the biggest events of the week with our Week in Review.
  • IPC, TeleWare Group Partner on Mobile Call Compliance Technology
    New government regulations, such the Dodd-Frank Act and the Markets in Financial Instruments Directive (MiFID) regulations - on mobile recording - have made life more difficult for many financial services companies.
  • Mobile Security Is Your Job, Sequent Makes it Easier
    News of the Heartbleed vulnerability has broken hard over the Internet this week - so for the next five minutes (in Internet time) consumers will be railing about digital security. Its prime time for Sequent Software, who just released an approval notice from Visa for its Trusted Services Manager systems. In essence, the global giant has examined Sequent's security and deemed it acceptable, which is just what consumers want to hear this week.
  • Wocket Smart Wallet Offers Convenient Biometric Security
    The concept of a smart mobile wallet is not entirely new. Products like COIN and LOOP allow for contactless payment at the behest of their users, who program gift cards and credit cards directly into their smart wallets for easy access. This situation can be dangerous if access is too easy, but fortunately the Shelton based compeny NXT-ID, Inc. has devised a new mobile wallet that operates independently of a smartphone, and uses voice recognition to authenticate users.
  • As Businesses Go Mobile, What Security Concerns Arise?
    In an increasingly mobile world, business owners and managers don't just have to worry about burglars and wayward employees stealing sensitive information out of filing cabinets. Now, they also have to combat hackers along with apps and websites that aren't very secure. When Congress recently reported on the state of mobile security devices, compliments of the Government Accountability Office (GAO), it was revealed that cybercriminals are on the loose with a 185 percent spike in mobile device malware attacks in the past year. That's a massive leap of 14,000 to 40,000 attacks.
  • Have You Had a Look at Syncrify For Cloud Backup?
    Until recently, the enterprise world depended on its own servers for backups and disaster recovery. The problem with this model is that enterprises also need to run their businesses. In other words, maintaining backups takes time away from any potentially profit-gaining activities. For this reason, many of them started migrating files to an explosively-growing segment of the tech industry: cloud backup providers.

Mobile Security Featured Videos

Mobile Security Industry News

  • Mobile Security - LinkedIn
  • Mobile Security - Youtube
  • Mobile Security - Facebook
  • Mobile Security - Twitter
  • Mobile Security - RSS Feed

Request a Demo

Weekly Demonstration: SAP Mobile Secure
Solution including SAP Afaria Cloud

Free 30-day Trial

Best MDM in the cloud. Best MDM
Analytics. Best MDM price.

From the Experts

HCL Talks Mobile Security, Management in a Hosted Model, Part 1

By now, most enterprises should be familiar with the BYOD (bring your own device) trend. But just because companies have heard of BYOD, doesn’t mean they understand its full implications...

Verizon Exec Discusses the Evolution of Mobile Security, Part 1

2007 was only six years ago, but our world was a very different place. We had a different president in the White House, the sports world had never heard of Biogenesis, and the word “smartphone” had not become mainstream...

Mobile Content Management: Best Practices

There’s no denying that we live in an increasingly mobile, connected world. When I leave the office at night, I check my work e-mails on my personal smartphone, and I fire up my laptop to write stories...

SAP Provides Mobile Security Management for Protecting Corporate Apps, Content and Devices

Studies show that 80 percent of workers need access to work documents outside the office, while 66 percent of workers use some kind of consumer file transfer tools, like e-mail or iTunes, to move work documents to their mobile devices...

Featured Whitepapers

Securing Mobile Apps in a BYOD World

We have recently witnessed a major disruption in corporate computing, driven by the adoption of new mobile operating systems and bring-your-own-device (BYOD) environments. As enterprise IT organizations struggle to support new mobile strategies, they must comply with government regulations and internal security policies. With over 80% of North American enterprises supporting e-mail, calendar, and contact information on mobile devices, it has become clear that the devices can boost productivity and competitive advantage.

Protect Your Enterprise by Securing All Entry and Exit Points

How Enterprise Mobility Management Addresses Modern Day Security Challenges

Featured Datasheets

Secure Enterprise Apps in Seconds across Managed and Unmanaged Mobile Devices

Security concerns can slow the momentum toward mobile computing. Whether your enterprise is deploying third-party mobile apps or developing them internally, they must be locked down tight. That's not easy with users bringing their own mobile devices, downloading their own apps, mixing personal and business content, and carrying confidential business data outside of corporate protection. Learn how you can take control and secure your enterprise apps in seconds.

Protect Your Business with Full Mobile Security

A Robust, Integrated Set of Leading Security Solutions Helps Ensure a Risk-Free Work Environment

Featured Podcast

Mobile Drives Field Service Productivity at Satellites Unlimited

Enterprise Apps overcoming Insecurity. The pros/cons of containerization/wrapping?

Part  1 Highlights:

  • What is App Wrapping and why do enterprises securely benefit?
  • Sharing can lead to bad mobile etiquette in multi-OS environments
  • Policy and Compliance during Development and Deployment
  • Regulated Mobility for protecting Corporate IP

Part 2 Highlights:

  • Complexity of large scale multi-OS Security
  • Data at Rest Encryption and Single Sign on (SSO) usage for Mobile Security
  • Impact of MDM with App Wrapping
  • Evolution of Mobile Information Management

Part 3 Highlights:

  • Role of EMM suites, securing the heterogeneous mobile enterprise
  • SAMSUNG KNOX, Containerization of Android
  • iOS 7, More Evolved App Security
  • BYOx, secure control over devices, content and apps

Featured Webinars

Mobile Drives Field Service Productivity at Satellites Unlimited

SAP and Amazon Web Services Deliver Enterprise Mobility

You are invited to learn how businesses like yours can quickly and securely gain mobile productivity through managing an ever increasingly mobile workforce on the Amazon Web Services (AWS) Cloud.

Mobile Drives Field Service Productivity at Satellites Unlimited

SAP Afaria Cloud Edition and SAP Mobile Secure in the Amazon Web Services Cloud

You are invited to learn how businesses like yours can quickly and securely gain mobile productivity through managing an ever increasingly mobile workforce on the Amazon Web Services (AWS) Cloud.

Mobile Drives Field Service Productivity at Satellites Unlimited

Mobile Drives Field Service Productivity at Satellites Unlimited

Field service has never been more competitive or faster changing than it is today. Going mobile is a must to stay ahead of the competition, provide improved services, and keep up with ever-increasing customer expectations.

Featured Videos

Featured Infographics

Featured Press Releases