Filter Blogs expand_more
Blog add
Authors add
9 Results for 'mobile security'
Blog

By Entrust Datacard

August 14, 2013

Today, mobile technology is a standard method of conducting business. As smart devices become more capable of harboring and transferring information, IT executives are relying on them more and more to contain and transmit sensitive data.
Blog

By Entrust Datacard

August 16, 2013

When a company decides to mobilize, it often allows many of its central processes to be governed by remote devices apart from its central server. This often goes beyond basic email and contact lists and includes important corporate applications that, if compromised, could lead to devastating organizational consequences.
Blog

By Entrust Datacard

February 26, 2013

Entrust product marketing manager Mike Byrnes explores the innovation in mobile security and identities during RSA Conference 2013 at the Moscone Center.
Blog

By Entrust Datacard

May 11, 2016

In late 2014, the HIMSS Analytics Mobile Devices Study found that around 50 percent of hospitals and nearly 70 percent of clinicians were using mobile devices to access electronic health records and other data, or to remotely serve patients. In early 2016, it's not unlikely that this number has increased
Blog

By Entrust Datacard

August 15, 2013

As the global workforce continues to mobilize, many processes that were once typically run from applications based on an internal server are now conducted with remote devices. IT executives, therefore, must count on such devices to provide adequate protection against any malicious activity that might interfere with critical business processes.
Blog

By Entrust Datacard

September 09, 2013

It’s not a Peyton Manning TV spot, but it’s certainly more important to the security of your identities. In Entrust’s recent infographic, “Mobile Security: Perception vs. Reality,” a third-party study found that 38 percent of enterprises have or plan to implement mobile device certificates in 2013.
Blog

By Entrust Datacard

April 02, 2013

In December, Entrust and Forrester began work on a Technology Adoption Profile (TAP) whitepaper centering on mobile. As organizations have begun to accept the inevitable — the eventuality of mobile devices permeating networks and infrastructures — they are looking to address mobile security as a whole and not as siloed device types (e.g., corporate- and employee-owned).
Blog

By Entrust Datacard

April 14, 2014

To ensure the maintenance of enterprise security in the age of BYOD, Entrust recommends companies implement a certificate authentication structure for their mobile networks to create a unique identity for each smartphone or tablet connected to the company. By generating identities for each device, company IT departments can help guarantee that these products are suitably guarded and, therefore, trustworthy.
Page 1 of 1