Filter Blogs expand_more
Blog add
Authors add
9 Results for 'mobile security'
Blog

Mobile Security: Perception vs Reality Infographic

By Entrust Datacard
June 18, 2013
Blog

A Glance at Mobile Security: The Secure Element

By Entrust Datacard
August 14, 2013
Today, mobile technology is a standard method of conducting business. As smart devices become more capable of harboring and transferring information, IT executives are relying on them more and more to contain and transmit sensitive data.
Blog

A Glance at Mobile Security: The Secure Container

By Entrust Datacard
August 16, 2013
When a company decides to mobilize, it often allows many of its central processes to be governed by remote devices apart from its central server. This often goes beyond basic email and contact lists and includes important corporate applications that, if compromised, could lead to devastating organizational consequences.
Blog

Entrust at RSA: Secure Mobile, Leverage Mobile

By Entrust Datacard
February 26, 2013
Entrust product marketing manager Mike Byrnes explores the innovation in mobile security and identities during RSA Conference 2013 at the Moscone Center.
Blog

How to Enhance Mobile Security in Health Care Organizations

By Entrust Datacard
May 11, 2016
In late 2014, the HIMSS Analytics Mobile Devices Study found that around 50 percent of hospitals and nearly 70 percent of clinicians were using mobile devices to access electronic health records and other data, or to remotely serve patients. In early 2016, it's not unlikely that this number has increased
Blog

A Glance at Mobile Security: The Trusted Execution Environment

By Entrust Datacard
August 15, 2013
As the global workforce continues to mobilize, many processes that were once typically run from applications based on an internal server are now conducted with remote devices. IT executives, therefore, must count on such devices to provide adequate protection against any malicious activity that might interfere with critical business processes.
Blog

Mobile and Security - No Longer Mutually Exclusive

By Entrust Datacard
April 02, 2013
In December, Entrust and Forrester began work on a Technology Adoption Profile (TAP) whitepaper centering on mobile. As organizations have begun to accept the inevitable — the eventuality of mobile devices permeating networks and infrastructures — they are looking to address mobile security as a whole and not as siloed device types (e.g., corporate- and employee-owned).
Blog

Digital Certificates on Your Phone?

By Entrust Datacard
September 09, 2013
It’s not a Peyton Manning TV spot, but it’s certainly more important to the security of your identities. In Entrust’s recent infographic, “Mobile Security: Perception vs. Reality,” a third-party study found that 38 percent of enterprises have or plan to implement mobile device certificates in 2013.
Blog

How Device Certificates Secure our Mobile Identities

By Entrust Datacard
April 14, 2014
To ensure the maintenance of enterprise security in the age of BYOD, Entrust recommends companies implement a certificate authentication structure for their mobile networks to create a unique identity for each smartphone or tablet connected to the company. By generating identities for each device, company IT departments can help guarantee that these products are suitably guarded and, therefore, trustworthy.
Page 1 of 1