This IDC study analyzes the enterprise mobility management (EMM) market in 2015. In addition to ranking of the top 14 vendors by revenue, it provides an overview of key market trends and events that helped shape the market landscape in 2015.
To better mitigate the breach risks tied to the growing use of mobile devices, organizations need to adopt enterprise digital rights management as a way to improve data security, says Gartner's John Girard.
A UAE-based activist targeted by a rare and valuable remote exploit for Apple's mobile software has caused concern over the continued sale of powerful spying tools to governments with poor human rights records.
Security firms are warning that they've seen a spike in infections tied to a virulent strain of trojanized Android adware called Shedun - a.k.a. HummingBad - that can root smartphones, survive factory resets and earn cybercriminals big money.
More than half of all Android smartphones have a flaw that can be exploited to bypass the devices' full-disk encryption. As a result, law enforcement agencies - or attackers - could access all supposedly encrypted data being stored on vulnerable devices.
Ransomware, regulations, botnets, information sharing and policing strategies were just some of the topics that dominated the "International Conference on Big Data in Cyber Security" hosted by Edinburgh Napier University in Scotland.
In revised guidance, the National Institute of Standards and Technology cautions enterprises to assume that "external environments contain hostile threats" as they establish programs to allow employees and contractors to remotely access critical systems.
Today's IT solutions increasingly leverage multiple heterogeneous platforms including mobile and cloud for mission-critical applications. With these businesses face an ever more challenging landscape and tighter regulatory controls in order to protect their brands and meet the demands of the marketplace. Today's...
The Gartner Magic Quadrant is one of the most influential research tools that IT buyers use to evaluate vendors and keep pace with the accelerating shift from Mobile Device Management activity to Enterprise Mobility Management (EMM) strategy.
Ten years ago the smart phone, and a few years later the tablet, changed...
As more banks and government agencies stop providing free BlackBerries to employees, the beleaguered smartphone manufacturer is attempting to reboot with the launch of its first Android smartphone, dubbed Priv for privacy.
In evaluating current or future BYOD policies and deployments, it's important to recognize that your industry
regulations, employee needs and company culture should play a significant role in determining how your
company enables BYOD. One approach does not suit all companies. Even within a company, you may...
BlackBerry plans to buy mobile device management rival Good Technology for $425 million. BlackBerry must prep for a future in which it no longer manufactures hardware - and that's why this deal makes sense.
The bad news is that the new KeyRaider malware has so far compromised more than 225,000 Apple accounts worldwide. The good news, according to Ryan Olson of Palo Alto Networks, is that only modified, or "jailbroken," ioS devices are at risk.
Numerous services are enabled by default in Microsoft's Windows 10, and as employees connect their BYOD equipment to corporate networks, the cloud, collaboration and location tie-ins could pose enterprise security risks, experts warn.