The Complete Mobile Security Resource

What's Hot in Mobile Security

  • Mobile Security Week in Review
    Even a holiday week is a pretty big week when it comes to mobile security, and the attempts staged to wrongfully access a system still continue even in the face of Easter. With a weekend-a long one for some-now afoot, it's a good time to take a look at the biggest events of the week, and get a better handle on how those events relate to the larger field of mobile security as a whole. So settle in and put on another cup of coffee, because it's time for our Week in Review coverage!
    4/18/2014
  • New Support Emerges For Smartphone Anti-Theft Devices
    While the idea of the mandatory kill switch for smartphones being signed into law has proven at least somewhat controversial, the controversy may be about to boil right out of the concept. A shocking wave of new support has arisen for the smartphone kill switch, coming not only from several breeds of device maker, but also from the major carriers as well.
    4/16/2014
  • NT OBJECTives Delivers New Security Service, NTOMobile On-Demand Web Application Security Testing
    NT OBJECTives, Inc. is a provider of automated security testing software, services and Software as a Service (SaaS) for web applications. NTO's customizable suite of solutions includes application security testing, SaaS scanning and in-depth consulting services to help companies build the most comprehensive, efficient and accurate web application security program.
    4/14/2014
  • Mobile Security Week in Review
    It's been another big week in mobile security, as the eternal struggle between those who own mobile devices planning to use same without outside intrusion and those who want to intrude on mobile devices carrying on. New threats and new countermeasures have come up for consideration, but figuring out how it all fits into the grander scheme of things isn't always simple. With that in mind, and a weekend afoot, it's a great time for a look at the biggest events of the week with our Week in Review.
    4/12/2014
  • IPC, TeleWare Group Partner on Mobile Call Compliance Technology
    New government regulations, such the Dodd-Frank Act and the Markets in Financial Instruments Directive (MiFID) regulations - on mobile recording - have made life more difficult for many financial services companies.
    4/11/2014
  • Mobile Security Is Your Job, Sequent Makes it Easier
    News of the Heartbleed vulnerability has broken hard over the Internet this week - so for the next five minutes (in Internet time) consumers will be railing about digital security. Its prime time for Sequent Software, who just released an approval notice from Visa for its Trusted Services Manager systems. In essence, the global giant has examined Sequent's security and deemed it acceptable, which is just what consumers want to hear this week.
    4/11/2014
  • Wocket Smart Wallet Offers Convenient Biometric Security
    The concept of a smart mobile wallet is not entirely new. Products like COIN and LOOP allow for contactless payment at the behest of their users, who program gift cards and credit cards directly into their smart wallets for easy access. This situation can be dangerous if access is too easy, but fortunately the Shelton based compeny NXT-ID, Inc. has devised a new mobile wallet that operates independently of a smartphone, and uses voice recognition to authenticate users.
    4/11/2014
  • As Businesses Go Mobile, What Security Concerns Arise?
    In an increasingly mobile world, business owners and managers don't just have to worry about burglars and wayward employees stealing sensitive information out of filing cabinets. Now, they also have to combat hackers along with apps and websites that aren't very secure. When Congress recently reported on the state of mobile security devices, compliments of the Government Accountability Office (GAO), it was revealed that cybercriminals are on the loose with a 185 percent spike in mobile device malware attacks in the past year. That's a massive leap of 14,000 to 40,000 attacks.
    4/10/2014
  • Have You Had a Look at Syncrify For Cloud Backup?
    Until recently, the enterprise world depended on its own servers for backups and disaster recovery. The problem with this model is that enterprises also need to run their businesses. In other words, maintaining backups takes time away from any potentially profit-gaining activities. For this reason, many of them started migrating files to an explosively-growing segment of the tech industry: cloud backup providers.
    4/10/2014
  • What Avira's New Features For iOS Means For iPhone Users
    You might want to hurry up and get some updates to Avira if you have it on your iPhone. The company has responded to the demands of the market in an age where mobile commerce is becoming more commonplace. Avira released a new version of Avira Mobile Security for iOS allowing users to experiment with two new features, namely "Identity Safeguard" and "Locate Device."
    4/9/2014
  • IBM Announces More Secure Technique for Mobile Notifications
    Mobile notifications have become just another facet of life with a mobile device, but the technology is actually still quite new-with plenty of room for improvement. IBM Labs has come up with one particular improvement in making mobile notifications more secure thanks to its top of the line cloud offering. With the uses for mobile notification ranging from telling you when you have an appointment to when it's your turn to play a game, all the way up to getting you an emergency message, there are also plenty of ways to mess with those notifications.
    4/8/2014
  • Growth Hacking Driver of Big Gains for Some Messaging Apps
    Messaging apps are an increasingly large part of the landscape for users, both for mobile devices and for the less mobile equivalent devices. The ease of being connected to other users is hard to pass up, and messaging apps can provide these connections rapidly and with little incident. But some messaging apps are turning to less than pleasant methods in order to fuel growth, particularly a process known as "growth hacking". This process in turn is leading to some rather pronounced developments in the field, and even some changes in the rules for places like Google Play.
    4/7/2014
  • Mobile Security Week in Review
    The issue of security for mobile devices has always been a major issue for users of all stripes. Protecting devices, or even figuring out ways around protection, makes mobile security an issue that's hard to ignore. But that means a lot of news emerging around mobile security, and taking a bit of time to consider all the new events in the field can be very welcome. So settle in, take a breath, greet the weekend properly and let's run down the biggest events of the week with our Week in Review!
    4/5/2014
  • LogMeOnce Launches Kickstarter Campaign for Encrypted USB and Password Manager
    Security is a major concern with the Internet-not just for businesses, but for individuals too. Hackers want passwords, giving them access to important financial and identification data so that they can steal from unwary individuals. While people may be willing to create complex passwords, a new password for each account is something that people are less willing to do. It can be difficult to remember all of them, and thus people alternate between a small group of passwords for a variety of accounts. This means that if the password to Facebook is compromised, the password for a bank account might very well be compromised too.
    4/4/2014

Mobile Security Featured Videos

Mobile Security Industry News

  • Mobile Security - LinkedIn
  • Mobile Security - Youtube
  • Mobile Security - Facebook
  • Mobile Security - Twitter
  • Mobile Security - RSS Feed

Request a Demo

Weekly Demonstration: SAP Mobile Secure
Solution including SAP Afaria Cloud

Free 30-day Trial

Best MDM in the cloud. Best MDM
Analytics. Best MDM price.

From the Experts

HCL Talks Mobile Security, Management in a Hosted Model, Part 1

By now, most enterprises should be familiar with the BYOD (bring your own device) trend. But just because companies have heard of BYOD, doesn’t mean they understand its full implications...

Verizon Exec Discusses the Evolution of Mobile Security, Part 1

2007 was only six years ago, but our world was a very different place. We had a different president in the White House, the sports world had never heard of Biogenesis, and the word “smartphone” had not become mainstream...

Mobile Content Management: Best Practices

There’s no denying that we live in an increasingly mobile, connected world. When I leave the office at night, I check my work e-mails on my personal smartphone, and I fire up my laptop to write stories...

SAP Provides Mobile Security Management for Protecting Corporate Apps, Content and Devices

Studies show that 80 percent of workers need access to work documents outside the office, while 66 percent of workers use some kind of consumer file transfer tools, like e-mail or iTunes, to move work documents to their mobile devices...

Featured Whitepapers

Securing Mobile Apps in a BYOD World

We have recently witnessed a major disruption in corporate computing, driven by the adoption of new mobile operating systems and bring-your-own-device (BYOD) environments. As enterprise IT organizations struggle to support new mobile strategies, they must comply with government regulations and internal security policies. With over 80% of North American enterprises supporting e-mail, calendar, and contact information on mobile devices, it has become clear that the devices can boost productivity and competitive advantage.

Protect Your Enterprise by Securing All Entry and Exit Points

How Enterprise Mobility Management Addresses Modern Day Security Challenges

Featured Datasheets

Secure Enterprise Apps in Seconds across Managed and Unmanaged Mobile Devices

Security concerns can slow the momentum toward mobile computing. Whether your enterprise is deploying third-party mobile apps or developing them internally, they must be locked down tight. That's not easy with users bringing their own mobile devices, downloading their own apps, mixing personal and business content, and carrying confidential business data outside of corporate protection. Learn how you can take control and secure your enterprise apps in seconds.

Protect Your Business with Full Mobile Security

A Robust, Integrated Set of Leading Security Solutions Helps Ensure a Risk-Free Work Environment

Featured Podcast

Mobile Drives Field Service Productivity at Satellites Unlimited

Enterprise Apps overcoming Insecurity. The pros/cons of containerization/wrapping?

Part  1 Highlights:

  • What is App Wrapping and why do enterprises securely benefit?
  • Sharing can lead to bad mobile etiquette in multi-OS environments
  • Policy and Compliance during Development and Deployment
  • Regulated Mobility for protecting Corporate IP

Part 2 Highlights:

  • Complexity of large scale multi-OS Security
  • Data at Rest Encryption and Single Sign on (SSO) usage for Mobile Security
  • Impact of MDM with App Wrapping
  • Evolution of Mobile Information Management

Part 3 Highlights:

  • Role of EMM suites, securing the heterogeneous mobile enterprise
  • SAMSUNG KNOX, Containerization of Android
  • iOS 7, More Evolved App Security
  • BYOx, secure control over devices, content and apps

Featured Webinars

Mobile Drives Field Service Productivity at Satellites Unlimited

SAP and Amazon Web Services Deliver Enterprise Mobility

You are invited to learn how businesses like yours can quickly and securely gain mobile productivity through managing an ever increasingly mobile workforce on the Amazon Web Services (AWS) Cloud.

Mobile Drives Field Service Productivity at Satellites Unlimited

SAP Afaria Cloud Edition and SAP Mobile Secure in the Amazon Web Services Cloud

You are invited to learn how businesses like yours can quickly and securely gain mobile productivity through managing an ever increasingly mobile workforce on the Amazon Web Services (AWS) Cloud.

Mobile Drives Field Service Productivity at Satellites Unlimited

Mobile Drives Field Service Productivity at Satellites Unlimited

Field service has never been more competitive or faster changing than it is today. Going mobile is a must to stay ahead of the competition, provide improved services, and keep up with ever-increasing customer expectations.

Featured Videos

Featured Infographics

Featured Press Releases