Endpoint Protection

Endpoint Protection | News, how-tos, features, reviews, and videos

Mobile security

Machine learning-based threat detection is coming to your smartphone

MobileIron has partnered with a machine learning-based threat detection vendor to port its technology onto its EMM client, a growing trend in the mobile space.

mobile enterprise apps

CISO: Think about how your customers actually use your mobile apps

Veteran chief information security officer Barak Engel blasts the mobile community for torpedoing enterprise security in his new book, "Why CISOs Fail Security."

Android 8 Oreo Security

Android 8.0 in-depth: Oreo's not-so-obvious security enhancements

Some deep-dive details on significant security upgrades headed to your device with Google's Android 8.0 Oreo release.

four professionals looking at mobile devices

How to choose the right enterprise mobility management (EMM) tool

As mobile device management continues to morph, consider what EMM features you need right now as well as what you might need in the future -- and don't neglect the user experience.

Computerworld - Mingis on Tech - video podcast teaser [3x2/1800x1200]

Mingis on Tech: Android vs iOS – for mobile security, which one's better?

Apple's iOS has long been seen as a more secure mobile operating system than Android. Here's how to evaluate each side's claims about mobile security.

android vs ios security boxing battle boxing gloves

Android vs iOS security: Which is better?

While all mobile devices have inherent security risks, Android has more vulnerabilities because of its inherent open-source nature, the slow pace with which users update the OS and a lack of proper app vetting.

emm predictions 2017 mdm

MDM comparison: VMware AirWatch vs. IBM Maas360

Real-world users of mobile device management systems weigh in on two big players in the market: VMware AirWatch and IBM MaaS360.

google glass enterprise edition

Is Google Glass really ready for the enterprise?

Google Glass Enterprise Edition is now available to more businesses through its network of development partners, but does it really work as a collaboration and productivity tool?

mobile device management

Choosing EMM software as an add-on may soon be unnecessary

Enterprise mobility management is quickly becoming just another set of tools in a larger software bundle offered by big-name vendors -- leaving IT managers to decide whether to even consider independent software providers.

mobile security data protection [Thinkstock]

What is app wrapping? One way to more secure mobile apps

As part of a mobile application management strategy, app wrapping allows developers and administrators to apply security enforcement policies to a mobile app without changing its look or functionality.

mobile payments / tablet

How to expose flaws in custom-built mobile apps

As companies move toward a mobile-first strategy, more and more are developing apps in-house -- and unwittingly exposing themselves to cybersecurity flaws. Here's how to avoid that problem.

facial recognition biometrics

Facial recognition in the new iPhone would make huge waves

Amid reports that Apple is preparing to abandon fingerprint biometric authentication in favor of 3D facial recognition coupled with iris scans, the mobile industry is preparing for authentication upheaval.

mobile device management

What's the difference between MDM, MAM, EMM and UEM?

While BYOD made it easier for employees to get their jobs done anywhere, anytime, keeping company data safe requires serious management. Here's how to pick between Mobile Application Management and Mobile Device Management.

Mobile security

The top 5 mobile security threats

When mixing personal and professional tasks on your smartphone, it's inevitable that someone is going to accidentally stumble onto malware. The SANS Institute's Chris Crowley has some advice on how to avoid trouble.

Take back your vacation with the help of Outlook's Automatic Replies

Connecting with work from the road? Here's how to stay safe

As more companies move to ban the use of public Wi-Fi networks by employees, here's a rundown of how to avoid man-in-the-middle attacks when traveling.

neon repair sign fix patch by dana vollenweider unsplash

Here's how to check if your PC got Microsoft's fix for Windows Defender bug

Security researcher Tavis Ormandy, one of Microsoft’s biggest critics, praises Microsoft for its rapid response to a newly discovered security hole

p1200736

Google cites progress in Android security, but patching issues linger

The chances of you installing malware on your Android phone is incredibly small, according to Google.

secusuite for samsung knox 1

BlackBerry preps a more secure Samsung Galaxy S7

Secusmart, the BlackBerry subsidiary that secures the German Chancellor Angela Merkel's smartphone, will roll out a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform later this year.

mobile security stock image one bad device

Smarter authentication makes mobile experiences more secure, user friendly

Big data and context help make authentication experiences in today's mobile and digital world more secure, yet easier to use.

20160225 stock mwc ericsson booth security locks

How much are vendor security assurances worth after the CIA leaks?

Google, Apple, Microsoft and other software vendors are working to identify and patch the vulnerabilities described in the CIA leak, but ultimately this doesn't change the status quo of software security.

Load More