Automated Mobile Security, Part 4

The following is the fourth, and final, post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated security for company networks and mobile devices. Part...

What We’re Reading, Week of 10/22

LinuxInsider – It’s Not You, Android – It’s Your Apps Network World – Gartner: Mobile Device management tech set to take off InformationWeek – Windows 8: A Win for Enterprise Security Ars Technica – Android apps used by millions vulnerable to password, e-mail...

What We're Reading, Week of 10/22

LinuxInsider – It’s Not You, Android – It’s Your Apps Network World – Gartner: Mobile Device management tech set to take off InformationWeek – Windows 8: A Win for Enterprise Security Ars Technica – Android apps used by millions vulnerable to password, e-mail...

Automated Mobile Security, Part 3

The following is the third post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated security for company networks and mobile devices. Part one of the...

Automated Mobile Security, Part 2

The following is the second post in a series of excerpts from NCP engineering‘s technical white paper, Automated Mobile Security: Leveraging Trusted Network Connect (TNC) IF-MAP to provide automated security for company networks and mobile devices. Part one of the...