Searched for: "data protection in a mobile environment"
- Security (34)
- Mobility (20)
- Cxo (8)
- Networking (7)
- Cloud (4)
- Hardware (4)
- Microsoft (4)
- Big Data (3)
- Data Centers (3)
- Virtualization (3)
- After Hours (2)
- Consumerization (2)
- Data Management (2)
- Developer (2)
- Banking (1)
- Collaboration (1)
- Enterprise Software (1)
- Innovation (1)
- Open Source (1)
- Project Management (1)
- Storage (1)
About 106 results for "data protection in a mobile environment"
Apple devices are gaining a foothold in the corporate world and also with small and medium-sized businesses. Here's what you need to know if you want to move your company to Apple.
Zombie Apps are a growing threat in mobility. Find out how they work and how to defend against them.
Cloud computing is a huge amount of distributed and dynamic sharing resources that are provided on request to clients over the Internet instead of having a local server or personal...
Recently, the development of Smartphones has been reported the number of security vulnerabilities. Although, these Smartphones have a concept of sandbox for the security, sensitive...
C.J. Radford predicts the usage of cloud applications will accelerate in 2015, says data-at-rest protection is imperative for enterprise cloud deployment, and more in this Q&A.
2014 was an all-star year for Apple and developers of iOS and Mac software. Here's a look at the big Apple technologies that were released this year and how developers have been us...
Defending a PaaS from hackers is a huge undertaking. Simplify this task by breaking it down into four phases of a defense-in-depth approach.
Gartner analysts suggest you keep a close eye on the items listed in its latest trend report. Michael Kassner examines the technologies on the list and finds a common thread: cloud...
MANET is a type of wireless ad-hoc network that usually has a routable networking environment. Mobile Ad hoc Networks (MANETs) use unidentified routing protocols that hide node ide...
In law professor Danielle Citron's book, "Hate Crimes in Cyberspace," she suggests legal and ethical remedies that may help people who are the targets of online abuse and harassmen...