Apple app developer news Android app developer news

mobile security magazine search results

App Developer Magazine issues we found relating to mobile security


Sept13 Issue: Mobile Security In the Age of BYOD

Inside this issue we have the Top Global Apps report from Distimo you won't want to miss! NTIA's code of conduct for app developers and how it's going to affect your app development efforts, why push notifications should be a part of most apps, what to consider with COPPA compliancy when developing apps, everything you need to know about app store optimization, and loads more!

mobile security news search results

Developer news items we found relating to mobile security

83 results
Does your organization need the iPhone X or not?

Does your organization need the iPhone X or not?

Thursday, November 30, 2017 by

Do I need the new iPhone? No. But, I sure do want it.It’s interesting that with the 10-year (aluminum) anniversary of the device, Apple has gone all glass around stainless steel, doing away with the aluminum frame for its flagship product.Now that the device has been launched, organizations will undoubtedly see a quick spike in broken, lost, and stolen devices - with en...
The battle of biometric security coming in 2018

The battle of biometric security coming in 2018

Friday, November 03, 2017 by

Fingerprint sensors first appeared in smart devices in 2007 and then gained momentum as a 4-digit PIN code replacement in 2013's Apple iPhone 5S. Hailed as the future of authentication by some, fingerprint's security weaknesses were quickly exposed by the children of sleepy dads, cats' paws and gummy bears. Still, the lure of convenience today and the promise of securit...
Codeless security integrations by Blackberry and Appdome announced

Codeless security integrations by Blackberry and Appdome announced

Tuesday, August 15, 2017 by

BlackBerry Limited and Appdome, a cloud hub for mobile app integration, announced they are enabling codeless integration of secure voice, video and messaging capabilities. Available under Appdome’s newest service category, Secure Messaging, the BBM Enterprise SDK (software development kit) offers a growing set of secure communications capabilities that mobile app develo...
Appdome integrates into the AppConfig community

Appdome integrates into the AppConfig community

Monday, August 14, 2017 by

Appdome, a cloud hub for mobile app integration, has joined the AppConfig Community, re-affirming its ongoing commitment to a secure and efficient mobile industry. AppConfig’s best practice feature-set can now be automatically integrated in apps via the Appdome platform, all without any code or coding. App Publishers (ISVs) and enterprise app developers can add AppConfi...
New biometric authentication could be a password killer

New biometric authentication could be a password killer

Wednesday, July 12, 2017 by

Pramati Technologies has announced the ThumbSignIn biometric authentication SaaS platform for mobile and web applications and additionally its certification by the FIDO Alliance. The platform enables enterprises and service providers to deploy strong authentication solutions that reduce reliance on passwords and protect against phishing, man-in-the-middle, and replay at...
Apperian announces new security capabilities

Apperian announces new security capabilities

Monday, July 03, 2017 by

Apperian, an Arxan company and provider of mobile application management (MAM) and security solutions, has announced several platform enhancements, which increase the security of enterprise mobile app data. These updates take advantage of native device capabilities, multiple industry protocols and additional password controls, to provide a solution for distributing secu...
Why runtime application self-protection is critical for app security

Why runtime application self-protection is critical for app security

Tuesday, June 20, 2017 by

Today most of us go about implementing security from the outside in. The common practice is to start by defining a perimeter and trying to defend it with various security tools. Even though perimeters have been porous for more than a decade, we still can’t give up this notion that if we build a better wall we can keep our enterprises safer.Certainly that is where most e...
Biometric authentication for your apps from Appdome and BehavioSec

Biometric authentication for your apps from Appdome and BehavioSec

Wednesday, April 26, 2017 by

Appdome, a cloud service that automates mobile integration by fusing new services to mobile apps, is partnering up with biometric authentication technology company, BehavioSec. Appdome for BehavioSec now enables mobile developers and mobility professionals (such as mobile fraud, IT, or Security groups) to rapidly integrate advanced biometric and behavior based authentic...
How companies can keep their remote teams safe

How companies can keep their remote teams safe

Monday, April 03, 2017 by

If you hate bringing your work home with you, spare a thought for the 3.7 million Americans for whom home is the workplace.The telecommuter population is growing faster than the overall employee base, according to Global Workplace Analytics, and with half of all jobs deemed suitable for performing from home, it is a trend that is set to go on growing. Already, around a ...
Intent-based mobile app security: It's harder than you think

Intent-based mobile app security: It's harder than you think

Thursday, March 23, 2017 by

Recently, intent-based security has become a buzzword and a commonly used phrase in the developer community. However, this new wave of security is much more than just a catchphrase. The concept of intent-based security adds a new level of protection to applications in containerized environments, specifically by understanding what the app is intended to do and looking fo...
Canonical collaborates to with NXP to improve IoT

Canonical collaborates to with NXP to improve IoT

Wednesday, March 22, 2017 by

NXP and Canonical have collaborated to port Ubuntu Core to the LS1043A, a quad-core SoC targeted at IoT gateways and networking equipment. With this combination, device manufacturers gain a platform with which to build high throughput IoT Gateways.Ubuntu Core has been used in a variety of devices from IoT Gateways to network equipment. IoT Gateways benefit from the wide...
ImmuniWeb Mobile launches to offer better mobile security testing

ImmuniWeb Mobile launches to offer better mobile security testing

Wednesday, March 15, 2017 by

High-Tech Bridge announces the launch of ImmuniWeb Mobile as part of ImmuniWeb Application Security Testing Platform. The new offering will provide comprehensive assessment of iOS and Android mobile applications, mobile infrastructure backend and data channel encryption. All ImmuniWeb Mobile packages are provided with a zero false-positives SLA. The mobile application s...
How Trump will affect the technology industry

How Trump will affect the technology industry

Friday, January 20, 2017 by

To many, it seemed like we’d never make it to 2017. After a bruising presidential campaign, perhaps the longest in electoral history. But here we are, our first true, post-election year in eight years. For me, these years are always fun, with soaring hopes dashed and ill tidings avoided. Moreover, it’s during these post-election years that we quietly return to the ...
Scanning JavaScript for vulnerabilities: How the impossible is now possible

Scanning JavaScript for vulnerabilities: How the impossible is now possible

Friday, January 13, 2017 by

Javascript is everywhere, and it's awesome! But the world most popular language can be riddled with problems if you aren't a careful programmer.There is a saying that speaks to the incredible popularity of JavaScript as a programming language and it goes like this: “any application that can be written in JavaScript, will eventually be written in JavaScript.” The we...
Vinous acquires Delectable and Banquet wine apps

Vinous acquires Delectable and Banquet wine apps

Monday, December 12, 2016 by

Vinous CEO and Founder Antonio Galloni has acquired the wine apps Delectable and Banquet. Known as the "Instagram of wine," the app has been downloaded over a million times and has over 120,000 monthly loyal, unique users.    Delectable allows users to scan a wine label with their smartphones and immediately pull up reviews and tasting notes from a rich comm...
Core Security is making the password reset process self-service, faster and simpler

Core Security is making the password reset process self-service, faster and simpler

Wednesday, November 30, 2016 by

Core Security announced the release of Core Mobile Reset 1.0 and Core Access Insight 9.2. With the introduction of these solution updates, enterprise security teams will now be able to resolve immediate threats with prognostic analytics applied to the big identity and access data, while also enhancing organizational efficiency.Ineffective password management i...
New Security Report 2016 shows 64 percent of millennials experienced a comprised account hack

New Security Report 2016 shows 64 percent of millennials experienced a comprised account hack

Thursday, November 17, 2016 by

TeleSign has released its Consumer Account Security Report 2016, providing insight into consumer sentiments on online security and the value they place on their digital lives. Of the 1,300 U.S. consumers surveyed, nearly a third report the value of their online life at $100,000 to priceless. Further, more than half of the respondents surveyed (55 percent) place the onus...
What happens to security when your apps go to the cloud

What happens to security when your apps go to the cloud

Wednesday, November 09, 2016 by

When Marc Andreessen wrote, “software is eating the world,” he meant that every business is literally turning into software. The problem is that every line of code you write makes you easier to attack. Historically, we dealt with security by putting up walls and scanning. But the complexity of modern software environments has made these approaches ineffective ...
Resonance launches SDK For proximity-based device pairing

Resonance launches SDK For proximity-based device pairing

Friday, November 04, 2016 by

Resonance has emerged from stealth to announce the availability of its new proximity-based software development kit (SDK) for device pairing. Developers are using the Resonance SDK to create advanced mobile application features for a wide range of iOS and Android apps where secure device-to-device connectivity can provide value - gaming, e-commerce, payments, retail, tr...
Paving the way to smarter phone security

Paving the way to smarter phone security

Wednesday, October 19, 2016 by

75 million Smartphone users admit that while they are afraid of cyber attacks, they have not set a password for their smartphones according to the latest TransUnion’s Cyber Security Survey. While at first glance, this seems completely alarming and the ramifications could result in identity theft, it is also not surprising as consumers are not technologists and they just...
The growing gap between the speed of business and the pace of software development

The growing gap between the speed of business and the pace of software development

Monday, October 17, 2016 by

The rapid pace of business today is only increasing, which means companies need quick access to effective, flexible and scalable technology in order to succeed. IT organizations are simply struggling to keep up with this growing demand for business applications, which can’t be developed fast enough, updated often enough, or maintained well enough. It’s a com...
SOTI MobiControl 13.2 Ships to help enterprises manage devices

SOTI MobiControl 13.2 Ships to help enterprises manage devices

Monday, October 17, 2016 by

SOTI Inc. announced the availability of SOTI MobiControl 13.2. MobiControl provides mobility management across all endpoints, seamlessly managing mobile devices, connected peripherals, applications, content, and security from within a single management console.Version 13.2 of SOTI’s flagship product, is now improved with a variety of powerful new features, includin...
Security First: 5 tips for building a secure mobile app from the ground up

Security First: 5 tips for building a secure mobile app from the ground up

Wednesday, October 05, 2016 by

With more than two billion smartphone users worldwide, the app market has exploded — along with risks. Mobile app developers are still struggling to make security a priority and by 2017, cyber-attacks via vulnerable apps are anticipated to account for 75% of all mobile security breaches. Given what's at stake, it's critical that developers build apps that are &ldq...
Apple developer patents, hacks, and iOS 10 - oh my! October issue lands

Apple developer patents, hacks, and iOS 10 - oh my! October issue lands

Saturday, October 01, 2016 by

It’s hard to believe - but fall is upon us and 2017 is right around the corner. October always ushers in the feeling of campfires, fall-festivals, and what the flip and I going to do with my apps for the holiday season coming up!   Not to worry everyone - our October issue is here, and it’s over 90 pages of industry news, tips, and articles ...
Iris Scanning and the Future of Mobile Security

Iris Scanning and the Future of Mobile Security

Wednesday, September 14, 2016 by

The promise of iris scan technology has been shown in sci-fi movies for decades. Various governments use it to secure borders, defense facilities, banks use it to authenticate high value transactions, secure access to safes and vaults. Recent advancements in the evolving mobile biometrics field has brought iris recognition technology to our hands – to our mobi...
Security of Things 2016 Conference to Focus on IoT Security, Privacy, and Authentication

Security of Things 2016 Conference to Focus on IoT Security, Privacy, and Authentication

Wednesday, August 24, 2016 by

Coming to Chicago this October, the Smart Card Alliance Security of Things 2016 conference is bringing security, privacy and authentication to the forefront of the Internet of Things (IoT) with speakers from both the IoT and security communities. Speakers will discuss the impact embedded security technology is expected to have on connected cars, wearables, smart ho...
Being Ready for a Mobile-First Business Strategy

Being Ready for a Mobile-First Business Strategy

Sunday, July 31, 2016 by

If your business isn’t talking about its mobile strategy yet, it’s only a matter of time. According to 451 Research, 40 percent of companies will prioritize the mobilization of general business apps over the next two years, compared to just mobilizing field service and sales teams. Companies recognize mobility offers huge business benefits, from driving customer satisfa...
AdaptiveMobile Adds SS7 Cat 3 Detection Capabilities to Mobile Threat Intelligence Platform

AdaptiveMobile Adds SS7 Cat 3 Detection Capabilities to Mobile Threat Intelligence Platform

Wednesday, June 29, 2016 by

AdaptiveMobile has announced advanced SS7 “Cat 3” Signalling Protection detection capabilities to its Mobile Threat Intelligence Platform including Network Memory, Location Plausibility, and Remote Intercept. The Company’s advanced threat detection is based on continuous data and analysis with all rules validated with information from across five continents.  Adapt...
How March Madness Impacts Enterprise Mobile Data Usage and BYOD Security

How March Madness Impacts Enterprise Mobile Data Usage and BYOD Security

Tuesday, April 05, 2016 by

Oversized events like March Madness and the Olympics not only can cause decreased productivity from employees, but also may increase security risks for companies whose employees are using devices that access corporate data. We visited with Michael Covington, VP Product for Wandera, to discuss research the company conducted during the NCAA basketball tournament to learn ...
A Developer's Perspective on Mobile Security in the Age of BYOD

A Developer's Perspective on Mobile Security in the Age of BYOD

Thursday, March 31, 2016 by

With the cost savings of BYOD continuing to lure organizations to adopt this approach, the number of companies allowing employee-owned devices is still on the rise, as well. In early 2015, Tech Pro Research announced that 74 percent of organizations either already allow or were planning to allow employees to bring their own devices to work. At the time of this writing, ...
Using Virtual Mobile Infrastructure to Protect Corporate Data

Using Virtual Mobile Infrastructure to Protect Corporate Data

Saturday, March 05, 2016 by

We chatted with Avast Vice President Sinan Eren to talk BYOD mobile security and how the Avast VMP solution provides companies with the ability to create a virtual mobile infrastructure (VMI) that streams mobile apps to any device. Sinan is a cybersecurity expert, who has extensive knowledge in both the engineering and business aspects of security. ADM: What is the...
VMware AirWatch 8.3 Release Includes Enhanced Security Functionality

VMware AirWatch 8.3 Release Includes Enhanced Security Functionality

Sunday, February 21, 2016 by

The latest rendition of the VMware AirWatch Enterprise Mobility Management (EMM) platform, AirWatch 8.3, has been released now providing support for the VMwareWorkspace ONE app to help organize app access and eliminate the need for passwords. It also expands the AirWatch Privacy First program with a user-facing website and visual privacy notice to mitigate concerns thro...
Security Risks for iOS Apps That Use Alternate Solutions for Hot Patching

Security Risks for iOS Apps That Use Alternate Solutions for Hot Patching

Thursday, February 18, 2016 by

Nothing comes free. There is always a give and take with anything and the iOS app store is no exception. With such an inherently closed ecosystem the benefits for users include the relative assurance that, from a security standpoint, iOS apps are safe to use.This is a benefit for iOS app publishers as well as their apps profit from the halo affect this perception provid...
Intercede Releases New High Level Mobile Security Solution

Intercede Releases New High Level Mobile Security Solution

Sunday, February 14, 2016 by

Intercede has released RapID, a security solution that delivers password and token free access to cloud services from mobile applications. In addition, RapID incorporates PKI based authentication and encryption to provide security for business and consumer applications. The solution is designed to establish trusted relationships between end users and services providers ...
One in Four Android Apps Have High Risk Security Flaws

One in Four Android Apps Have High Risk Security Flaws

Friday, February 12, 2016 by

Mobile developers continue to battle security issues with their apps according to a new report by NowSecure. The annual report, 2016 NowSecure Mobile Security Report, provides insight into the current state of mobile security. According to the report a quarter of Android apps have at least one high risk security flaw, 35 percent of communications sent by mobile dev...
Are Your Mobile Apps Ready for 2016

Are Your Mobile Apps Ready for 2016

Wednesday, February 10, 2016 by

Mobile devices became the shopper’s device of choice for browsing and buying this holiday season, with mobile accounting for 57.2 percent of all online traffic and 36.2 percent of all online sales – respective increases of 15.2 and 30 percent over 2014, according to IBM Watson Trend. With another holiday shopping season behind us and companies working hard to ...
Everything You Need To Know About the Malicious Apps in Google Play

Everything You Need To Know About the Malicious Apps in Google Play

Tuesday, January 26, 2016 by

Earlier this month, the Google Play store was reduced to chaos with the discovery that 13 apps - several of which were extremely popular- were infected with malware developed by the infamous China-based BrainTest, a malicious “brand” that had been lurking in the shadows, but has now made a comeback.We’ve rounded up everything you need to know about this attack on Androi...
Study Shows Companies Want Apps to Directly Impact Their Bottom Line

Study Shows Companies Want Apps to Directly Impact Their Bottom Line

Tuesday, December 29, 2015 by

We recently visited with Mark Lorion, Chief Marketing Officer & Head of Product at Apperian, about the ramifications of the results of Apperian’s recently published the 2015 Enterprise Mobile App Trend Report, which analyzed nearly two million app deployments across hundreds of thousands of enterprise users.Lorion is the CMO and Head of Product, whose responsibility...
What You Need to Know about BYOD Security

What You Need to Know about BYOD Security

Wednesday, December 02, 2015 by

As employees bring their own devices to work, IT teams face an assortment of challenges, from managing mobile apps on a myriad of different devices to backing up and restoring business data. But bar none, the greatest burden for IT staff is securing business data on mobile devices.The Good, the Bad, and the Ugly (in Reverse Order)The UglyThe BYOD phenomenon has spawned ...
Dual Biometrics - Added Security Without Added Hassle

Dual Biometrics - Added Security Without Added Hassle

Friday, November 20, 2015 by

Our mobile phones are a portable treasure trove of personal information. They often carry a record of where we’ve been through the metadata of our photos and the people we talk to in our call and message logs - not to mention our emails, notes, appointments and a range of other things we store inside different apps. From this data an outline of our entire lives can...
New Innovations for DevOps, Agile Management and Security At CA World

New Innovations for DevOps, Agile Management and Security At CA World

Thursday, November 19, 2015 by

CA World 2015, CA Technologies annual conference, saw over 5,000 CA customers, partners, analyst media and others gather together to learn more about the company’s transformation as it continues to hone the focus of its offerings around DevOps, Agile Management and Security disciplines across all platforms – mobile, mainframe, distributed and cloud. At the event, C...
New Mobile Security Report Shows Most Apps Have Critical Vulnerabilities

New Mobile Security Report Shows Most Apps Have Critical Vulnerabilities

Tuesday, November 10, 2015 by

Checkmarx and AppSec Labs have released a new mobile app security titled “The State of Mobile Application Security 2014-2015”. Among the findings of the report is that the typical app is exposed to an average of 9 different vulnerabilities. The report also indicates in situations where vulnerabilities are built into the code or application logic, the vulnerability of iO...
Checkmarx Creates Campaign to Help Companies With Security Awareness

Checkmarx Creates Campaign to Help Companies With Security Awareness

Tuesday, October 13, 2015 by

Checkmarx has release a new microsite to help companies raise awareness within their development teams for secure development practices. The campaign provides a kit that includes physical and online tools to promote safe application development within their organization.The physical kit offers a package to help raise awareness within a development organization for appli...
Hacking, Malware and Security Are Top Concerns in Mobile Development

Hacking, Malware and Security Are Top Concerns in Mobile Development

Tuesday, October 06, 2015 by

Security concerns continue to grow for the application development industry as a new study has shown that hacking, malware and security are top concerns for IT departments.According to a new survey conducted by commissioned by SOTI, Inc., IT leaders expect up to 20% of their IT budgets to be consumed for mobile initiatives, with security concerns top the list of mobile ...
Qualcomm to Offer Malware Detection Inside Snapdragon 820 Processor

Qualcomm to Offer Malware Detection Inside Snapdragon 820 Processor

Wednesday, September 09, 2015 by

Qualcomm has announced the upcoming availability of Snapdragon Smart Protect which will first made available through the Qualcomm Snapdragon 820 processor. Snapdragon Smart Protect uses cognitive computing to provide real-time, on-device machine learning designed to support accurate and effective detection of zero-day malware threats for improved personal privacy and de...
New Report Highlights Wide Ranging Cybersecurity Challenges

New Report Highlights Wide Ranging Cybersecurity Challenges

Wednesday, September 02, 2015 by

Cybersecurity Ventures has released its Cybersecurity Market Report for Q3 2015 which provides an overview of software development and application security trends, statistics, best practices, and resources. Highlights of the report include:- “The SANS Institute 2015 State of Application Security Report” states that many information security engineers don’t understa...
HP Releases New Solutions for Mobile App Development and Management

HP Releases New Solutions for Mobile App Development and Management

Tuesday, April 07, 2015 by

HP has announced a number of new software releases that utilize HP's assets in big data analytics, application lifecycle management, IT operations management and security. Businesses can use HP's solutions to accelerate application delivery, test and monitor apps across multiple devices and operating systems, and provide mobile users with secure experiences.Measure the ...
Why Building a Global App Is Hard Work That Can Pay Off

Why Building a Global App Is Hard Work That Can Pay Off

Tuesday, March 31, 2015 by

These are amazing times to be a startup. It used to be that internationalization entailed securing offices, personnel and equipment, something that cost months or even years, as well as millions of dollars in investment. Any mistakes made were very costly and could threaten the future of the company. Today, if you are a mobile app developer, with the seeming push o...
TEE Provides Safe Environment for Secure Android App Development

TEE Provides Safe Environment for Secure Android App Development

Monday, March 23, 2015 by

Despite powering the majority of the world’s smart devices, Android has long been seen as the weak link in terms of mobile security. The open nature of the platform offers versatility and flexibility to app developers and the result is an incredibly diverse range of apps. However, it does mean that applications and their associated content are vulnerable to malware, man...
Suhas Uliyar, Vice President of Mobile Strategy with Oracle, Provides His Predictions on the Future for App Developers and the Mobile Enterprise

Suhas Uliyar, Vice President of Mobile Strategy with Oracle, Provides His Predictions on the Future for App Developers and the Mobile Enterprise

Thursday, January 08, 2015 by

I recently had a Q&A session with Oracle’s Suhas Uliyar, who serves as the company’s Vice President of Mobile Strategy. During the talk Suhas provided insights into what app developers can expect as it relates to the mobile enterprise. Richard: Will there ever be a standard development approach for the enterprise or mobile in general? Suhas: In general, no...
IDC's FutureScape: Worldwide Mobile Enterprise Solutions Report

IDC's FutureScape: Worldwide Mobile Enterprise Solutions Report

Monday, December 22, 2014 by

International Data Corporation (IDC) session called the DC FutureScape: Worldwide Mobile Enterprise Applications and Solutions 2015 Predictions Web conference was hosted for organizations and they took a look at different perspectives and insights on the long-term industry trends for emerging markets future growth.Predictions from the new Mobile Enterprise App...
Security to Take Front Row Seat for Operators and Governments in 2015

Security to Take Front Row Seat for Operators and Governments in 2015

Thursday, December 18, 2014 by

AdaptiveMobile has identified that network-level security is set to be on operator and government agendas for 2015. The company also identified trends that IoT and mobile malware will be defining new challenges of mobile security. AdaptiveMobile is he world’s number one mobile security provider. The company released its top mobile security trends for...
POODLE Attacks The SSL/TLS Problem

POODLE Attacks The SSL/TLS Problem

Thursday, December 11, 2014 by

The POODLE attack has been repurposed to attack a new SSL/TLS problem, according to Qualys’ Director of Engineering Ivan Ristic. Ristic pointed out that vulnerability what has triggered the attack to some of the most popular websites worldwide. The growth of F5 load balancers fell victim as devices have been impacted.The repurposed attack was previously disclo...
Mobile Devices Are the Weakest Link for Enterprise Mobility Solutions

Mobile Devices Are the Weakest Link for Enterprise Mobility Solutions

Tuesday, December 09, 2014 by

The time has come when the fact is accepted and discussed at large, the one that we have been trying to resist since long. We all are aware that today mobile Apps for Enterprise Management consider mobility at their core. It has given new peripheries to businesses by transforming operations – better engagement with customers – and of course an innovative appro...
LANDESK Offers New App Wrapping Capabilities to Its Enterprise Mobility Management Platform

LANDESK Offers New App Wrapping Capabilities to Its Enterprise Mobility Management Platform

Wednesday, October 08, 2014 by

LANDESK has announced the release of new features and upgrades to its Enterprise Mobility Management platform, including an application wrapping feature. This new feature will allow IT departments to add another layer of security to the enterprise apps they supply to their users.The solution allows an IT administrator to wrap an application in one step and deploy it to ...
Amazon Web Services Announces the General Availability of Zocalo Document Storage and Sharing Service

Amazon Web Services Announces the General Availability of Zocalo Document Storage and Sharing Service

Sunday, August 31, 2014 by

Amazon Zocalo has been available in a limited preview since early July and now the Amazon Web Services team is making Zocalo generally available to all AWS customers. There's a 30-day free trial (200 GB of storage per user for up to 50 users), after that its $5 per user per month.As part of this move to general availability, Amazon is also announcing that AWS CloudTrail...
AirPatrol ZoneDefense 5 Allows Automatic Changes for Mobile Device Security Based on Location

AirPatrol ZoneDefense 5 Allows Automatic Changes for Mobile Device Security Based on Location

Thursday, August 14, 2014 by

AirPatrol is offering a new add-in for its ZoneDefense 5 mobile device security platform that will allow organizations using the Enterprise Mobility Management suite from VMware’s AirWatch to automatically switch security policies of smartphones and tablets based on the device’s owner and location. ZoneDefense 5 allows systems administrators to create “ho...
JAMF Software Updates its iOS BYOD Platform

JAMF Software Updates its iOS BYOD Platform

Thursday, August 14, 2014 by

JAMF Software has upgraded its Casper Suite iOS device management solution designed to help IT professionals manage bring-your-own-device (BYOD) programs, while respecting employee privacy. The solution helps bridge the gap between corporate security concerns and the tendency to place too many restrictions on users who rebel against BYOD management soluti...
Sprint to Expand Mobile App Enterprise Solution Footprint

Sprint to Expand Mobile App Enterprise Solution Footprint

Thursday, August 14, 2014 by

Sprint is a launching a new ad campaign to promote its revamped suite of enterprise mobile solutions. The company announced the campaign this week, saying “Sprint helps businesses adapt more quickly to this changing environment, and take full advantage of their potential, with a new business brand and multi-million dollar marketing campaign which focuses on how technolo...
AnyAuth from built.io Provides Mobile Developers a Preferred Login Mechanism to Authenticate Users

AnyAuth from built.io Provides Mobile Developers a Preferred Login Mechanism to Authenticate Users

Wednesday, August 13, 2014 by

To help developers add additional security functionality, built.io has introduced a new product, AnyAuth, which allows enterprise app developers to use their preferred login mechanism to authenticate users.The new offering builds on built.io’s ability to offer authentication via Facebook, Twitter, and Google, as well as enterprise social networks like tibbr, Chatter and...
Genuitec Rolls Out Toolstack Compliance with Team Packages

Genuitec Rolls Out Toolstack Compliance with Team Packages

Thursday, August 07, 2014 by

Genuitec has introduced a new platform release that provides new split responsibility options for development teams. Team leads now are able to customize their tools based on centralized packages set up by IT administrators. Also administrators can manage updates across their enterprise while allowing team leads to control parts of their IDE. And developers can concentr...
HP Internet of Things Study Shows Majority of IoT Devices Contain Serious Vulnerabilities

HP Internet of Things Study Shows Majority of IoT Devices Contain Serious Vulnerabilities

Monday, August 04, 2014 by

HP has released new research, The Internet of Things State of the Union Study, which reveals that 70 percent of the most commonly used Internet of Things (IoT) devices contain serious vulnerabilities. The study is an outgrowth of HP’s OWASP Internet of Things Top 10 Project. The projects goal is to educate the IT community on the main facets of Internet of Things s...
New Oracle Survey Shows Development of Enterprise Mobile Apps to Increase Dramatically

New Oracle Survey Shows Development of Enterprise Mobile Apps to Increase Dramatically

Thursday, July 31, 2014 by

Oracle has sponsored a new global survey from CIO Strategic Marketing Services and Triangle Publishing Services that shows not only are enterprises committed to mobility today, but the rate of development, deployment and spending for support of mobile applications and devices is expected to increase dramatically over the next few years. The survey also shows that there ...
Suprema Debuts Fingerprint Scanner SDK for Android

Suprema Debuts Fingerprint Scanner SDK for Android

Friday, July 25, 2014 by

Suprema has announced the availability of a new fingerprint scanner SDK for Android which is designed for use with Suprema’s latest fingerprint scanner, the BioMini Slim. It provides the same performance as the company’s SDK for desktop computers. For example the SDK for Android enables mobile devices to capture fingerprints under harsh environmental cond...
Top Minds Across the Globe Give Their Thoughts on Advances in Security and Privacy

Top Minds Across the Globe Give Their Thoughts on Advances in Security and Privacy

Friday, July 11, 2014 by

Sometimes we forget that its not just companies within our industry that are providing thought leadership on relative topics concerning the mobile app industry. The top minds at universities across the globe are also analyzing current and future developments.This May in San Jose, California, the Mobile Security Technologies (MoST) conference brought together r...
Oracle Updates Mobile Suite for Enterprise App Developement

Oracle Updates Mobile Suite for Enterprise App Developement

Wednesday, July 02, 2014 by

Oracle has announced updates to its Oracle Mobile Suite, the company’s solution for development and deployment of mobile applications across multiple mobile platforms, and works with disparate enterprise systems.The latest release features a new cross device mobile development framework, Oracle Mobile Application Framework (MAF), which can simplify the development ...
New Mobile Malware SMS Worm, Selfmite, Attacks Android Users

New Mobile Malware SMS Worm, Selfmite, Attacks Android Users

Wednesday, June 25, 2014 by

AdaptiveMobile has discovered a previously unknown piece of mobile malware dubbed Selfmite.The malware spreads via SMS and fools users into installing a worm app which propagates by automatically sending a text message to contacts in the infected phone’s address book. The worm then requests users to install another legitimate app via an advertising platform; the au...
41 percent  of US Mobile Business Users Have Used Unsanctioned Enterprise Services

41 percent of US Mobile Business Users Have Used Unsanctioned Enterprise Services

Friday, May 23, 2014 by

Enterprises continue to struggle with security issues as IT departments fight what seems to be a losing battle as they struggle to protect data.On specific problem is unintentional data compromises caused by sloppy employee mobile practices. A report by Harmon.ie outlines this ‘Rogue IT’ phenomenon, which occurs when workers circumvent organizational controls by exploit...
Adobe Launches New ColdFusion 11 Enterprise Edition for Deploying Web and Mobile Apps

Adobe Launches New ColdFusion 11 Enterprise Edition for Deploying Web and Mobile Apps

Wednesday, May 07, 2014 by

Adobe has made available Adobe ColdFusion 11 Enterprise Edition, an all-in-one application server that offers developers a single platform to build and deploy scalable, web and mobile applications in enterprise environments. It includes new features to speed up development, testing, debugging, and deployment of mobile applications. ColdFusion 11 now provides f...
Diamond Fortress Technologies Provides Biometric Identity SDK for Android App Developers

Diamond Fortress Technologies Provides Biometric Identity SDK for Android App Developers

Tuesday, May 06, 2014 by

Diamond Fortress Technologies is now offering Android developers ICE Unlock, a platform that unlocks an Android device via the user’s fingerprint. A touchless biometric solution, ICE Unlock utilizes the device’s camera and complex mathematics to create a high quality map of a fingerprint and to verify identity. ICE Unlock works with existing hardware on more t...
NT OBJECTives Offers New On Demand Mobile Security Testing

NT OBJECTives Offers New On Demand Mobile Security Testing

Friday, April 18, 2014 by

NT OBJECTives, a provider of automated web application security solutions, is now offering the NTOMobile On-Demand platform powered by NTOSpider, a new security service specifically designed for mobile application testing, including mobile client native code and back-end web services. The platform delivers a way for security teams to complete comprehensive mobile a...
An Post Selects Good Technology to put Official Stamp on Mobile Security

An Post Selects Good Technology to put Official Stamp on Mobile Security

Wednesday, April 09, 2014 by

Good Technology™is proud to announce that An Post, the Irish postal service, has implemented Good for Enterprise® across its executive team’s mobile device fleet. This will provide the most streamlined and secure way for the executives to interact with confidential and sensitive information while working remotely.An Post is an excellent example of driving productiv...
Good Technology Equips Developers to Provide More Seamless Business User Experience

Good Technology Equips Developers to Provide More Seamless Business User Experience

Friday, March 28, 2014 by

Good Technology™ has introduced new capabilities in the Good Dynamics® Secure Mobility Platform, enabling developers to more easily mobilize legacy app functions and simplify provisioning of multiple Good-secured apps. These patent-pending features, server-based services and easy activation from the Good Dynamics Platform, help developers deliver apps with a great user ...
VoiceVault Release ViGo Voice Biometric Platform for Mobile App Development

VoiceVault Release ViGo Voice Biometric Platform for Mobile App Development

Wednesday, March 26, 2014 by

VoiceVault has released ViGo, a standardized approach to mobile voice biometrics that provides a complete voice biometric ecosystem to facilitate mobile app development and deployment.ViGo 100% focused on mobile, is cloud-based and is pre-configured for simplicity using either phrase or digit-based identity verification.ViGo accelerates speed to market saving organ...
Hightail File Sharing Now On Samsung Solution Exchange

Hightail File Sharing Now On Samsung Solution Exchange

Saturday, March 15, 2014 by

Business File Sharing Gets Better With Hightail's S Pen Integration and Enterprise-Grade Security on Samsung Mobile Devices Hightail has announced availability on the Samsung Solutions Exchange™ and soon on the Samsung KNOX ™ marketplace, helping business users bolster security and increase productivity when working on Samsung Mobile devices. The Samsung Solutions ...
Should Mobile App Developers Create Analytics to Track the NSA?

Should Mobile App Developers Create Analytics to Track the NSA?

Monday, March 03, 2014 by

Before you read on, do not think that this article is political in nature or advocates anything remotely approaching what the title suggests. Contrary to the “hook” contained in the title, the purpose of the article is to educate Mobile App Developers on what is reportedly done to the information obtained by the apps they develop. During this past year, the news ...
Weekly Roundup: 1b Apps on Metaps, Apple Arrives in Brazil, HP Access Catalog, Glass Etiquette, Amazon Coins, And Mobile Privacy

Weekly Roundup: 1b Apps on Metaps, Apple Arrives in Brazil, HP Access Catalog, Glass Etiquette, Amazon Coins, And Mobile Privacy

Saturday, February 22, 2014 by

Mobile App Privacy Policy: Do You Have One?What’s wrong with collecting personal information? In short – nothing. Commerce has always been about a mutually beneficial exchange; providing products and services in return for cash or an equivalent value exchange. New business models such as free-2-play or ad-funded content have accelerated the growth of the data-fuell...
Report Shows Most People Don't Trust Mobile Security When Purchasing Goods and Services

Report Shows Most People Don't Trust Mobile Security When Purchasing Goods and Services

Thursday, February 20, 2014 by

Global study in association with AVG Technologies indicates that 30 per cent of consumers worldwide consider Trust as the single largest obstacle to using mobile to purchase goods and servicesMEF, the global community for mobile content and commerce, today announced the results of its second annual Global Trust Report. The 2014 report, carried out in partnership with&n...
Oracle Acquires Enterprise Mobile Solutions Provider Bitzer Mobile

Oracle Acquires Enterprise Mobile Solutions Provider Bitzer Mobile

Tuesday, November 19, 2013 by

Oracle announced it has acquired Bitzer Mobile, a provider of mobile applications management solutions. Bitzer Mobile will be integrated into Oracle's portfolio of Fusion Middleware products, and is expected to be a core component to its mobile security strategy. Oracle is currently reviewing the existing Bitzer Mobile product roadmap and will be providing guidance to ...
Android Gets Enterprise Security With Lookout / Samsung Alliance

Android Gets Enterprise Security With Lookout / Samsung Alliance

Thursday, September 05, 2013 by

Lookout is increasing its footprint in enterprise mobility with a new partnership with Samsung and a soon to be released standalone business product. Lookout has announced it will provide integrated support to the Samsung Knox, an Android-based end-to-end mobile security solution that provides security hardening from the hardware through to the application layer. Looko...
Gartner Reports BYOD Initiatives Will Drive New Consumer Mobile Security Opportunities

Gartner Reports BYOD Initiatives Will Drive New Consumer Mobile Security Opportunities

Monday, August 12, 2013 by

A new Gartner report indicates that consumers are presently unwilling to purchase antivirus and other protection for mobile devices. However, as BYOD becomes more prevalent for enterprises, opportunities could increase for companies that provide ways to secure mobile devices. Gartner reports that by 2015, 30 percent of criteria for consumer mobile products will be rela...
Good Technology Introduces New $5 Per User Monthly Pricing Feature

Good Technology Introduces New $5 Per User Monthly Pricing Feature

Tuesday, August 06, 2013 by

Good Technology has introduced Good for Enterprise, a new monthly $5 per user pricing structure for its mobile data services. Targeted at enterprise IT professionals, the new per user pricing program offers mobile security management connecting employee email, calendar information, contact details, document data and browser access. Good Technology’s mobile products in...
Day two at AppsWorld North America 2013

Day two at AppsWorld North America 2013

Friday, February 08, 2013 by

Phew, day two is over, AppsWorld has come to a close and we are still excited about all we saw! It was truly our pleasure to meet everyone in person, talk with you about your services to developers, and attend break-outs to get some great developer related content. Here are the day two highlights: Intersog was at AppsWorld as a silver sponsor this year, and spoke wit...

Subscribe to App Developer Daily

Latest headlines delivered to you daily.