Data on mobile devices

Myra

 

Answer this Question

Answers

2 total
jimlynch
Vote Up (8)

Here's an article that might interest you.

Mobile device management
http://en.wikipedia.org/wiki/Mobile_device_management

"Mobile Device Management (MDM) software secures, monitors, manages and supports mobile devices deployed across mobile operators, service providers and enterprises. MDM functionality typically includes over-the-air distribution of applications, data and configuration settings for all types of mobile devices, including mobile phones, smartphones, tablet computers, ruggedized mobile computers, mobile printers, mobile POS devices, etc. This applies to both company-owned and employee-owned (BYOD) devices across the enterprise or mobile devices owned by consumers.[1][2]
By controlling and protecting the data and configuration settings for all mobile devices in the network, MDM can reduce support costs and business risks. The intent of MDM is to optimize the functionality and security of a mobile communications network while minimizing cost and downtime.[3]
With mobile devices becoming ubiquitous and applications flooding the market, mobile monitoring is growing in importance.[4] Numerous vendors help mobile device manufacturers, content portals and developers, test and monitor the delivery of their mobile content, applications and services. This testing of content is done real time by simulating the action of thousands of customers and detecting and correcting bugs in the applications.
Companies are alarmed at the rate of employee adoption of mobile devices to access corporate data. MDM is now touted as a solution for managing these devices in the workplace."

kreiley
Vote Up (4)

Is that an observation or a question? A little more specificity about what you are asking would be helpful.

Ask a question

Join Now or Sign In to ask a question.
Sure, you’ve changed a bunch of passwords, but are you doing all you can to protect yourself?
About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday.
Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help.
For almost an entire year, malicious attackers may have been harvesting customer information including credit card data.
The amount of electronic information (e.g., documents, images, emails, videos) organizations produce is staggering. Storing all your digital data in your data center can be expensive. That's why cloud storage -- which often comes at a fraction of the cost of storing the information on-premises -- has become increasingly popular.
Canadian police have arrested a 19-year-old man for allegedly using the Heartbleed bug to steal data about taxpayers.
A new webmail service called Lavaboom promises to provide easy-to-use email encryption without ever learning its users' private encryption keys or message contents.
The source code of TrueCrypt, a popular disk encryption tool, is not the most polished work of programming, but it has no critical flaws or intentional backdoors, security testers concluded in a report released Monday.
Websites that use encryption could be elevated in Google search results sometime in the future, according to The Wall Street Journal.
Andrew Auernheimer, known online as "weev," has won an appeal against his conviction for exploiting a vulnerability in AT&T's website to collect the email addresses of Apple iPad users. The 2010 incident earned him a 41-month prison sentence.

White Papers & Webcasts

See more White Papers | Webcasts

Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

randomness