Where are we now, and where are we going? …
Tag: Encryption
A #mobile app must be its own fortress and never assume platforms are encrypted, authenticated, use VPN or require a PIN for security. …
Businesses drag their feet when mobilizing line of business apps via legacy software migration thinking it’s cheaper to maintain a codebase than to rewrite for #mobile. …
To enforce #mobile data security policies directly, get an EMM solution with digital rights management to protect data where it flows & rests. …
If you don't have an Enterprise Mobility Management solution, start with Exchange Active Sync to enforce #mobile device policies and security. …