Category


Latest Blogs

All Blogs »

March 22, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Enterprise Mobility: Defining a Security Strategy

Enterprises today are on their third generation of mobile technologies, and each iteration has had its own unique challenges. In this Ask-an-Expert written response, IANS Faculty Aaron Turner details some of the highest-impact risks organizations face in the mobility space today and offers some maturity-specific approaches companies can take to combat these risks. 

Read More »


January 25, 2017 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 Preventing Phishing on Mobile Devices

Phishing attacks happen on every platform, but few anti-phishing tools are available for mobile. In this Ask-an-Expert live interaction, IANS Faculty Aaron Turner suggests some network-based controls that can help reduce the risk and underscores the need for mobile-focused user awareness training.

Read More »


November 20, 2015 | Mobile Access and Device Management
By Adam Ely, IANS Faculty

 Taming Container Chaos (Webinar Replay/Slides)

While mobile containers are the best strategy for securing corporate data on the go, they are less than simple to manage, especially for large, diverse organizations. In this webinar, IANS Faculty Adam Ely examines the main implementation challenges and pitfalls to avoid when deploying popular container technologies.

Read More »


November 10, 2015 | BYOD
By Caleb Sima, IANS Faculty

 Tools Ease Efforts to Control BYOD Apps, Access

Providing application access for mobile employees is always a balancing act between productivity and security. In this Ask-an-Expert live interaction, IANS Faculty Caleb Sima outlines ways to implement two-factor authentication and ensure usage of corporate-sanctioned apps in a bring-your-own-device (BYOD) scenario.

Read More »


November 4, 2015 | Mobile Access and Device Management
By Adam Ely, IANS Faculty

 Taming Container Chaos

While mobile containers are the best strategy for securing corporate data on the go, they are less than simple to manage, especially for large, diverse organizations. In this report, IANS Faculty Adam Ely examines the main implementation challenges and pitfalls to avoid when deploying popular container technologies and provides some key tips for successful implementation.

Read More »


September 29, 2015 | BYOD
By Aaron Turner, IANS Faculty

 Balancing Security and Flexibility With BYOD: Is It Possible?

BYOD sounds like a promising concept to many organizations, but when it comes to security, the policy can be a daunting challenge. In this live Ask-an-Expert interaction with a security team for a high-tech manufacturing company, IANS Faculty Aaron Turner outlines the various security layers involved in BYOD, including potential international implications, automated data backup and the true costs of supporting the policy.

Read More »


September 21, 2015 | Mobile Access and Device Management
By Michael Pinch, IANS Faculty

 Best Practices for Managing Devices Across PCI and non-PCI environments

With budgets tight, security teams are always looking for ways to shave costs and become more efficient. In this Ask-an-Expert written response, IANS Faculty Mike Pinch details some key considerations for organizations seeking to leverage common infrastructure management tools to manage devices on a separate PCI segment, including the fact that most shared security tools fall in scope for PCI-DSS and that network segmentation must be based on purpose-built controls.

Read More »


June 1, 2015 | Mobile Access and Device Management
By Aaron Turner, IANS Faculty

 EMM: Past, Present and Future

Regain Control: Mobile has become a highly strategic platform within most businesses, but how can you ensure these devices are being properly managed? In this report, IANS Faculty Aaron Turner explores the current state of the enterprise mobility management (EMM) space and offers key insight into where the marketplace is likely headed.

Read More »