Asia's Source for Enterprise Network Knowledge

Friday, May 24th, 2019

Enterprise Mobility

How IT can safely provide ‘anywhere, anytime’ access to data

Email and password data for more than 68 million users of the Dropbox file-sharing app – leaked through a data breach in 2012 – were put on sale by a data trafficker in a darknet website earlier this month. This follows similar incidents where hundreds of millions of MySpace, Tumblr and LinkedIn account details that were stolen several years ago were advertised for sale online.

SonicWall Secure Mobile Access for BYOD

Businesses are transforming their mobile strategies.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Beware of malware amidst Pokémon Go fervor

Users have to be made aware of security and privacy risks when apps request access to sensitive areas of the phone.

INFOGRAPHIC: Mobile security threats

Mixing personal and business-owned devices creates business risk. How do enterprises enable BYOD, while keeping data protected?

With Android apps inbound, Google preps a storage manager for Chrome OS

News

The current methods for managing local storage on a Chromebook suck. Google is fixing that.

 

An MDM enterprise app risk amid iOS security boosts

Mobility

Early this month, Check Point’s mobile research team presented details of a vulnerability, dubbed SideStepper, that allows an attacker to circumvent security enhancements in iOS 9 intended to make it harder for users to install a malicious enterprise app accidentally.

“As in any platform, iOS has its own vulnerabilities but most of them are really not exploitable so it’s hard to use the vulnerability to take over the mobile device,” says Ohad Bobrov, the mobile threat prevention area manager at Check Point. “So in truth, iOS is rather secure.”

Hackers can abuse the iOS mobile device management protocol to deliver malware

News

The attack bypasses the restrictions for enterprise app deployment introduced in iOS 9, Check Point researchers said

 

Box boosts Windows 10's enterprise potential with new app

News

The Box app works across PCs, tablets and smartphones

 

The Power and Payback of Unified IT Monitoring

Managing hybrid physical, virtual and cloud infrastructures

This white paper examines why unified IT monitoring is an important enabling technology for both enterprises and management service providers, including both the organizational and strategic impacts as well as the business case surrounding it. It goes further to examine CA Unified Infrastructure Management as an example of unified IT monitoring, and reviews three case studies where the solution has been deployed for active use in a unified manner.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.

Making the Smart Choice with the SmartCLOUD Solutions

Cloud service vendors

Cloud computing's benefits of cost reduction and control, and business enhancement are driving firms to take a serious look at moving a part or entire IT environments into the cloud.

By downloading this document, your details might be provided to the sponsor. If you cannot download the document, please contact us.