device security

device security news search results

Developer news items we found relating to device security

11 results
New-partnership-emerges-to-simply-IoT-security

New partnership emerges to simply IoT security


Wednesday, May 16, 2018 by

In an attempt to simplify IoT security when developing, Mocana Corporation has announced that it is partnering with Verizon to integrate Mocana’s endpoint security software solution, Mocana TrustPoint, with Verizon’s ThingSpace. Mocana TrustPoint, the company’s flagship IoT endpoint security solution, provides compliant security that protects more than 100 million ...


Overcoming-IoT-security-threats-to-achieve-better-ROI

Overcoming IoT security threats to achieve better ROI


Monday, January 8, 2018 by

With B2B IoT segments expected to generate more than $300B annually by 2020, it’s no surprise that companies are rushing to build out their IoT businesses and cash in on the modern day gold-rush. However, many manufacturers are struggling to achieve long term profitability for their IoT projects beyond initial hardware sales.The key to ensuring an organization’s IoT inv...


IoT-security-gets-tighter-thanks-to-SDC-Edge

IoT security gets tighter thanks to SDC Edge


Tuesday, December 5, 2017 by

StreamSets Inc. has debuted StreamSets Data Collector Edge (SDC Edge), an end-to-end data ingestion solution for resource and connectivity constrained systems such as Internet of Things (IoT) devices and the network infrastructure and personal devices that inform cybersecurity applications.SDC Edge packs the core functionality of the widely adopted StreamSets Data Colle...


Prey-expands-mobile-device-management-capabilities-for-iOS

Prey expands mobile device management capabilities for iOS


Wednesday, November 29, 2017 by

Prey Software has announced Apple Push Certification for Prey software. Organizations now have a simple path to mobile device security and management using its connection with Apple iOS for full remote control and access to Apple laptops, iPhones, and smart devices.Mobile Device Management for iOS requires the use of various digital certificates for its operation, and A...


Enterprise-BYOD-post-holiday-woes

Enterprise BYOD post holiday woes


Tuesday, January 24, 2017 by

Bring Your Own Device (BYOD) programs are a constant enterprise challenge. For unprepared organizations, the holidays can be especially difficult.Christmas to New Year’s Day is typically a peak time to purchase and/or download apps, so how can your enterprise effectively enroll an influx of new users and devices without compromising program security? While the recent ho...


The-impact-of-fake-retail-apps-hitting-the-Apple-App-Store-this-year

The impact of fake retail apps hitting the Apple App Store this year


Tuesday, November 8, 2016 by

Holiday retail woes have hit a little early this year, with hundreds of fake retail and product apps appearing in Apple’s App Store recently. The New York Times reports counterfeiters have disguised apps as retail chains like Dollar Tree and Foot Locker, department stores like Nordstrom and even luxury brands like Jimmy Choo. With Apple known to have a st...


The-Impact-of-BYOD-on-Developers

The Impact of BYOD on Developers


Friday, July 1, 2016 by

From Security Research Labs breaking into a phone within seconds on 60 Minutes earlier this year to the Apple/FBI debacle, it’s increasingly clear that enterprises have varying levels of device security protocols in place. Surprisingly, the responsibility of ensuring vital data remains secure, especially as BYOD policies and a mobile-first workforce become the norm...


Department-of-Homeland-Security-Creates-Mobile-Application-Playbook

Department of Homeland Security Creates Mobile Application Playbook


Tuesday, April 26, 2016 by

The U.S. Department of Homeland Security (DHS), Office of the Chief Technology Officer (OCTO), has created The Mobile Application Playbook (MAP), a DHS sponsored reference guide to assist federal agencies with the planning, management, and execution of mobile application projects.The MAP publication provides a roadmap for creating mobile applications and is designed to ...


New-Trustonic-Platform-Provides-Mobile-and-IoT-Developers-with-Device-Security

New Trustonic Platform Provides Mobile and IoT Developers with Device Security


Tuesday, February 9, 2016 by

Trustonic has released its "Trustonic Hybrid Protection" (THP) which offers built-in device security providing mobile and IoT developers with an adaptable security solution bringing together software and hardware secured solutions into one hybrid product. Trustonic combines advanced hardware enabled security solutions found in over 500 million devices with software...


Qualcomm-to-Offer-Malware-Detection-Inside-Snapdragon-820-Processor

Qualcomm to Offer Malware Detection Inside Snapdragon 820 Processor


Wednesday, September 9, 2015 by

Qualcomm has announced the upcoming availability of Snapdragon Smart Protect which will first made available through the Qualcomm Snapdragon 820 processor. Snapdragon Smart Protect uses cognitive computing to provide real-time, on-device machine learning designed to support accurate and effective detection of zero-day malware threats for improved personal privacy and de...


AirPatrol-ZoneDefense-5-Allows-Automatic-Changes-for-Mobile-Device-Security-Based-on-Location

AirPatrol ZoneDefense 5 Allows Automatic Changes for Mobile Device Security Based on Location


Thursday, August 14, 2014 by

AirPatrol is offering a new add-in for its ZoneDefense 5 mobile device security platform that will allow organizations using the Enterprise Mobility Management suite from VMware’s AirWatch to automatically switch security policies of smartphones and tablets based on the device’s owner and location. ZoneDefense 5 allows systems administrators to create “ho...