Searched for: "data protection in a mobile environment"
- Security (35)
- Mobility (25)
- Cxo (8)
- Networking (7)
- Cloud (4)
- Data Centers (4)
- Hardware (4)
- Microsoft (4)
- Big Data (3)
- Virtualization (3)
- After Hours (2)
- Consumerization (2)
- Data Management (2)
- Developer (2)
- Banking (1)
- Collaboration (1)
- Enterprise Software (1)
- Innovation (1)
- Open Source (1)
- Project Management (1)
- Storage (1)
About 113 results for "data protection in a mobile environment"
Small- to medium-sized businesses (SMBs) have a great deal to think about when it comes to ensuring their health, vitality, and success. Between a recovering economy, an increasing...
A Study on Mobile Device Control Model for Critical Data Leakage Prevention in the Enterprise Business Service
As information technology environment gets based on mobile, cloud, BYOD and mobile terminal just used for communication in the past is changed to support e-commerce and mobile offi...
Malware, HIPAA violations, and privacy breaches top healthcare execs' list of IT security risks, according to KPMG. Here's what to include in an effective IT security strategy.
The security landscape in ever-changing, and VMware's Tom Corn thinks that the software-defined data center is the answer to its pressing challenges.
Bring-your-own-device (BYOD) initiatives have inherent security risks, but trying to create a secure BYOD environment using layers of disparate technologies is ineffective. Find ou...
Apple devices are gaining a foothold in the corporate world and also with small and medium-sized businesses. Here's what you need to know if you want to move your company to Apple.
Zombie Apps are a growing threat in mobility. Find out how they work and how to defend against them.
Security aspects play an important role in almost all of the application scenarios given the vulnerabilities inherent in wireless ad hoc networking from the very fact that radio co...
Cloud computing is a huge amount of distributed and dynamic sharing resources that are provided on request to clients over the Internet instead of having a local server or personal...
Recently, the development of Smartphones has been reported the number of security vulnerabilities. Although, these Smartphones have a concept of sandbox for the security, sensitive...