Remove mobile-device-management
article thumbnail

Navigating Certificate Lifecycle Management (CLM) and Mobile Device Management (MDM) With an Effective PKI Solution

Security Boulevard

With the acceleration of digital transformation and hybrid work, the number of devices and machines. The post Navigating Certificate Lifecycle Management (CLM) and Mobile Device Management (MDM) With an Effective PKI Solution appeared first on Entrust Blog.

Mobile 64
article thumbnail

What Is Mobile Device Management? Role in Endpoint Security and Benefits

Heimadal Security

Mobile device management (MDM) is software that enables IT teams to supervise and secure all mobile endpoints in a company`s digital perimeter: laptops, tablets, smartphones, etc. By using a Mobile Device Management solution, IT administrators can track […] The post What Is Mobile Device Management?

Mobile 80
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How 1-Time Passcodes Became a Corporate Liability

Krebs on Security

A recent spate of SMS phishing attacks from one cybercriminal group has spawned a flurry of breach disclosures from affected companies, which are all struggling to combat the same lingering security threat: The ability of scammers to interact directly with employees through their mobile devices. Image: Cloudflare.com.

Mobile 291
article thumbnail

Cisco Duo Enhances Epic Mobile Apps Security

Duo's Security Blog

Epic is one of the leading software providers for systems that manage electronic healthcare records (EHR). Epic’s new flagship EPCS healthcare management mobile apps Haiku and Canto integrate with Cisco Duo to provide multi-factor authentication (MFA). More than 250 million patients have a current electronic record in Epic.”

Mobile 111
article thumbnail

Why Isn’t Mobile at the Center of Your Cybersecurity Strategy?

Security Boulevard

This is the first article in a guest blog series by Jason Bloomberg, Managing Partner, Intellyx Focusing on user authentication, including multi-factor authentication, is not enough to put mobile at the center of your cybersecurity strategy. The post Why Isn’t Mobile at the Center of Your Cybersecurity Strategy?

Mobile 80
article thumbnail

How to Protect Your Accounts with Multi-Factor Authentication

Duo's Security Blog

In today’s blog, we’re unpacking why MFA is a cornerstone topic in this year’s Cybersecurity Awareness Month and how it can keep your organization safe from potentially devastating cyber attacks. They are cumbersome for users to enter repeatedly, especially on mobile devices and tablets. " Try Duo today!

article thumbnail

What Is Mobile Email Management (MEM)?

Heimadal Security

But when it comes to corporate email on mobile devices, IT professionals usually deal with some serious threats. The ability to view corporate emails on personal/company devices is convenient […]. The post What Is Mobile Email Management (MEM)? appeared first on Heimdal Security Blog.

Mobile 108