Mobile applications are evolving with newer purposes and are becoming key to businesses across industries. However most of them still remain vulnerable to attacks. This stems from the reason that either there aren’t efficient development practices applied or the developers are unaware of the underlying threats to the entire concept… read more →
Mobile security in 2016: With most of the enterprise and consumer services business inevitably embracing mobile security, mobile platforms are the most recent and primary platforms of attack. As we have professional hackers, ‘hacktivists’ and many government agencies now tracking applications there is a great propensity to consider that mobile… read more →
As we saw, mobile device management is not about managing the device, but the data in particular. However, there is a lot about the devices that influences data. Wearable technology has come into vogue. Let us look the last three years.In 2012, Google launched its Google Glasses and Samsung rolled… read more →
After exploring policy level influences like COPE and Corporate Liability, our BYOD series now shifts to Mobile Device Management. For the past two decades, Enterprise Management has covered lot of devices – starting with Networking, Security, Server, Storage and Databases, through what was called ‘Configuration Management Databases’, linked with various… read more →
Most mobile users have made mobiles part of their life needs. Now, the mobile phone is the call and message device. It is your lifeline. It is your entertainment, games console, location finder, alarm clock, GPS device, health monitoring device, scheduler, and email device – add the other applications, mobile… read more →