IBM preps Watson to watch enterprise smartphones and IoT devices
IBM has rolled out its Watson cognitive capabilities to do battle with rival enterprise mobile device management (MDM) platforms.
IBM has rolled out its Watson cognitive capabilities to do battle with rival enterprise mobile device management (MDM) platforms.
Many workers who bring their mobile devices to the office don't care about security, which is forcing IT leaders to take action. Some CIOs offer stipends to help cover mobile expenses in return for BYOD compliance. Others are choosing to throw the kill switch on lost or stolen smartphones.
Tom Kaneshige | 07 May | Read more
One day after announcing the Galaxy S5 smartphone with a security-focused fingerprint scanner, Samsung announced that second-generation Knox software for enterprise-level security and management of Samsung devices will ship sometime in the second quarter.
Matt Hamblen | 25 Feb | Read more
In case you haven't been paying attention, the rules for IT admins have changed. Companies generally don't call the shots any more for which technologies are used by employees, and the boundaries of the network have all but disappeared. Citrix recognizes this culture shift and believes the latest release of its XenMobile platform is just what companies need.
Tony Bradley | 29 Oct | Read more
BlackBerry has been in a death spiral, and it's immediate future is a mystery. That is cause for concern for companies that rely on BlackBerry, and has forced businesses to start considering an exit strategy. But the real challenge is finding an alternate platform that doesn't compromise on security. Good Technology thinks it has the solution.
Tony Bradley | 25 Oct | Read more
Webroot announced a new release of the Webroot SecureAnywhere Business--Mobile Protection suite. The new version adds some key features and capabilities and blurs the line between mobile security and mobile device management. One element that stands out from the rest, though, is Webroot's new service to help IT admins understand the risk posed by installed apps.
Tony Bradley | 16 Oct | Read more
Apple is providing MDM APIs that better allow vendors to 'take advantage of the operating system hooks to provide application-level security'
Antone Gonsalves | 18 Sep | Read more
Despite legitimate uses, libertarians say tech-enforced policy is 'taking control out of the hands of the user and putting it in the third party's'
Antone Gonsalves | 30 Aug | Read more
BlackBerry 10 smartphone sales have been disappointing, and this month the company announced that it's essentially up for sale. Bad news aside, five key industry trends suggest that BlackBerry's purported advantages no longer matter.
John Brandon | 27 Aug | Read more
Infographic: If you're a CIO (or other IT leader) and you have a BYOD policy in place, you also have some trust issues to overcome: Your users aren't confident their personal data is remaining private.
Tom Kaneshige | 17 Jul | Read more
When it comes to smartphone safety, the single most important thing a mobile phone owner can do is lock the device with a unique, four-digit PIN.
Matt Hamblen | 31 May | Read more
BYOD brings out the classic problem between control of corporate information and individual freedom. It kicks it up to a whole new level because the devices belong to the users, but at least some of the apps and information belong to the company and as such need protection and policy enforcement.
Carlos Montero-Luque, chief technology officer, Apperian | 07 May | Read more
Mobile-device security startup Averail makes its debut today with its "containerization" software and service intended to give IT managers control over mobile-device apps and their content.
Ellen Messmer | 09 Apr | Read more
We all love our gadgets, but some of our favorite devices, however innocent they may appear, are poised to overwhelm IT departments worldwide.
Tony Bradley | 28 Feb | Read more
Citrix has announced its mobile device management platform, XenMobile, which will offer companies a secure way for employees to access native Citrix apps in the cloud as well as third-party software, such as Windows, SAP or even Salesforce.com.
Lucas Mearian | 20 Feb | Read more