• TREND MICRO
  • ABOUT
Search:
  • Latest Posts
  • Categories
    • Android
    • AWS
    • Azure
    • Cloud
    • Compliance
    • Critical Infrastructure
    • Cybercrime
    • Encryption
    • Financial Services
    • Government
    • Hacks
    • Healthcare
    • Internet of Everything
    • Malware
    • Microsoft
    • Mobile Security
    • Network
    • Privacy
    • Ransomware
    • Security
    • Social Media
    • Small Business
    • Targeted Attacks
    • Trend Spotlight
    • Virtualization
    • Vulnerabilities
    • Web Security
    • Zero Day Initiative
    • Industry News
  • Our Experts
    • Ed Cabrera
    • Rik Ferguson
    • Elisa Lippincott
    • Mark Nunnikhoven
    • Jon Clay
  • Research
Home   »   Mobility

Which Mobile Platforms Are Ready for the Enterprise?

  • Posted on:April 13, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
2

It’s the question every IT manager is asking. The short answer: there’s not a single consumer mobile operating system that offers all of the security and management capabilities that enterprises need—but they are getting better. To get a complete picture of current mobile OS security holes and management challenges, I strongly recommend reading a timely…

Read More

Dropbox – Enterprise Saviour or Enterprise Enemy?

  • Posted on:April 4, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
0

As a result of the increase in consumer-grade sync and sharing solutions being used within business, a huge black hole has been created when it comes to protecting and controlling corporate data. The enterprise can take a blanket view and block the access and synchronization of these solutions with gateway technology, or even completely lock…

Read More

Managing consumer risk in the enterprise – why IT needs to change mindset to better support the business

  • Posted on:March 26, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
2

Talking regularly* about the consumerization of IT can often make one sound like a broken record, but the economic, security and management challenges it throws up for enterprises are too important to ignore. The problems boil down to a lack of control, which can be described in two key ways. IT departments of course are…

Read More
Tags: BYODCesare GarlatiConsumerization of ITMobile Security

Video: Trend Micro Interview at the Mobile World Congress 2012

  • Posted on:March 19, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
1

Nelson Pereyra of bnetTV.com interviews Cesare Garlati at the Showstoppers 2012 event during the Mobile World Congress in Barcelona. Consumerization, BYOD and Mobile Security. Nelson Pereyra:  Hello, I’m Nelson Pereyra from bnetTV. Welcome to Showstopper 2012 in Barcelona. And with us is Cesare Garlati, Senior Director of Mobile Security at Trend Micro. How are you…

Read More

IDC White Paper: 3 Consumerization Issues to Conquer

  • Posted on:March 12, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
0

Do you feel like BYOD introduces more IT challenges than…uh… the total number of Android apps on the market today? Well, first let me assure you, there are not that many challenges. But they can be complex. So where do you begin?  This IDC white paper is a great starting point that can help you…

Read More

Jailbreaking BYOD Control. Is Apple iOS ready for enterprise primetime?

  • Posted on:February 27, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
11

Consumerization is happening now, but many IT departments simply aren’t prepared to deal with the new challenges and complexities it entails. With IT managers increasingly urged by CEOs to stop saying ‘no’ and start supporting consumer tools, they need to reappraise their traditional approach. Put simply, IT needs flexible standards – they can’t say no…

Read More
Tags: AndroidApple iOSBYODconsumerizationiOSMobileWindows Phone

Which Type of Mobile Device is More Secure – iOS or Android?

  • Posted on:February 15, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
6

By Vic Hargrave Apple rigorously scrutinizes applications before publishing them on its AppStore site, often rejecting apps that violate the company’s security and usability policies. Given this practice, it’s easy to assume that iOS mobile devices (iPhones, iPads, iTouch) are more secure than their Android counterparts. But there’s more to this story. Veracode, maker of application…

Read More

The Dark Side of BYOD – Privacy, Personal Data Loss and Device Seizure

  • Posted on:January 31, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
20

Many employees don’t understand the implications of using their personal devices for work. Many companies don’t understand that they are in fact liable for the consequences. This post covers the things you always wanted to know about BYOD but were too afraid to ask. Good News: Your company offers a BYOD program. You can finally…

Read More
Tags: AndroidBYODiOSMDMMobile Device ManagementPolicyPrivacysmartphonestablets

Consumerization Talks: Mobility Management and Security. A Customer Panel – Part Two.

  • Posted on:January 16, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
1

Learn from a panel of industry peers the solutions and the best practices that have turned consumer mobile technology into a competitive advantage for their companies. This is Part Two of the post based on the panel that I moderated at the IDC mobileNext Forum 2011 in San Francisco. Click here for Part One. Eric…

Read More

Consumerization Talks: Mobility Management and Security. A Customer Panel.

  • Posted on:January 9, 2012
  • Posted in:Mobility
  • Posted by:
    Trend Micro
2

Learn from a panel of industry peers the solutions and the best practices that have turned consumer mobile technology into a competitive advantage for their companies. This post is based on the recording of the panel that I moderated at the IDC mobileNext Forum in December 2011 in San Francisco. Eric Erickson VP Information Systems…

Read More
Page 9 of 11 « ‹ 8910 › »

Security Intelligence Blog

  • Necurs Evolves to Evade Spam Detection via Internet Shortcut File
  • Monero-Mining RETADUP Worm Goes Polymorphic, Gets an AutoHotKey Variant
  • XLoader Android Spyware and Banking Trojan Distributed via DNS Spoofing

Featured Authors

Ed Cabrera (Chief Cybersecurity Officer)
Ed Cabrera (Chief Cybersecurity Officer)
  • The Role That IT Security Teams Need to Play in Connected Hospitals
Elisa Lippincott (TippingPoint Global Product Marketing)
Elisa Lippincott (TippingPoint Global Product Marketing)
  • TippingPoint Threat Intelligence and Zero-Day Coverage – Week of April 16, 2018
Jon Clay (Global Threat Communications)
Jon Clay (Global Threat Communications)
  • This Week in Security News: Warnings and WannaCry
Mark Nunnikhoven (Vice President, Cloud Research)
Mark Nunnikhoven (Vice President, Cloud Research)
  • Drupal Latest Platform To Be Hit With Critical Vulnerability
Rik Ferguson (VP, Security Research)
Rik Ferguson (VP, Security Research)
  • Today’s Predictions for Tomorrow’s Internet
William
William "Bill" Malik (CISA VP Infrastructure Strategies)
  • The Risks of Bio-IoT

Follow Us

Trend Micro in the News

  • Graffiti in the digital world: How hacktivists use defacement
  • The connected workforce: The importance of protecting home and corporate networks
  • NIST Cybersecurity Framework Series Part 5: Recover

Trend Micro Blogs

  • Internet Safety for Kids
  • Countermeasures
  • Home and Home Office
  • |
  • For Business
  • |
  • Security Intelligence
  • |
  • About Trend Micro
  • Asia Pacific Region (APAC): Australia / New Zealand, 中国, 日本, 대한민국, 台灣
  • Latin America Region (LAR): Brasil, México
  • North America Region (NABU): United States, Canada
  • Europe, Middle East, & Africa Region (EMEA): France, Deutschland / Österreich / Schweiz, Italia, Россия, España, United Kingdom / Ireland
  • Privacy Statement
  • Legal Policies
  • Copyright © 2017 Trend Micro Incorporated. All rights reserved.