This website uses cookies

We use cookies to personalize content and analyze access to our website. You can find further information in our data protection policy.

OK

Posts tagged with mobile devices

Cybersecurity Strategy · Data Security · Internet of Things · IT policy · VPN

Protecting Mobile Data Privacy in the Enterprise

The workplace today is dominated by mobile devices. Employee interaction via smartphone or tablet has become second nature.  They will very likely use them to check work emails, download files...

smartphone
Cybercrime · Cybersecurity Strategy · Mobile · VPN

The risk of attack is getting closer – mobile devices in focus

Smartphones are part of everyday life, either for private or professional use. However, while many users have taken basic measures to protect their desktop PC or laptop, this is not the case for...

Remote Access VPNs For Dummies
Rethink Remote Access · VPN

When Remote Access Becomes Your Enemy

As convenient as it would be for businesses to have all their IT service providers working on-site, just down the hall, that’s not always possible. That’s why secure remote access is a component...

IPv6

IPv6: Looking Back on Year One

It was only one year ago that the world welcomed the launch of IPv6, the long-anticipated solution to the problem of the world running out of IP addresses.

rainer
Expert Q&A · IPsec · Mobile · VPN

Expert Q&A: Preventing Mobile Hacking: Must You Take Precautions?

*Editor’s Note: This column originally appeared in TechTarget’s SearchNetworking.com 

Industry Commentary · IT policy · Mobile · SSL · virtualization · VPN

VPNs Enable Desktop Virtualization

By Bernd Reder

mobile_security400
Expert Q&A · Industry Commentary · IT policy · Mobile · VPN

Webinar: What CIOs and CTOs Need to Know About Mobile Device Security

Rainer Enders, CTO, Americas at NCP engineering, recently conducted an Execsense webinar around what CIOs and CTOs need to know about mobile device security. Rainer explains how the replacement of...

Industry Commentary

Forward Thinking: Network Security Predictions for 2013

The proliferation of social networking and the acceleration of personal devices for corporate use can be a boon for remote workers. Unfortunately, this increase in systems and cross-platform networks...

IT policy · Mobile · Rethink Remote Access

How Can I Ensure App Store Security for my Remote Users?

*Editor’s Note: This column originally appeared in TechTarget’s SearchEnterpriseWAN.com.

Highlights

What We're Reading, Week of 11/19

Dark Reading – Half Of Machines Shopping On Cyber Monday Likely Contain VulnerabilitiesMidsize Insider  – IT Security Threats: The Predictive Problem SearchCloudApplications – Mobile cloud trends:...