Filter Blogs expand_more
Blog add
Authors add
2 Results for 'smartphone'
Blog

By Entrust Datacard

July 22, 2014

Oftentimes, this is all it takes for an enterprise security breach to begin. Although the cybercrimes that most frequently make headlines are the ones carried out by fearsome hackers in distant lands, the truth is that all too often security episodes start where you'd least expect them — from the laptop of a trusted employee, or the swiped smartphone of a business executive.
Blog

By Entrust Datacard

April 14, 2014

To ensure the maintenance of enterprise security in the age of BYOD, Entrust recommends companies implement a certificate authentication structure for their mobile networks to create a unique identity for each smartphone or tablet connected to the company. By generating identities for each device, company IT departments can help guarantee that these products are suitably guarded and, therefore, trustworthy.
Page 1 of 1