How to Create a Compliance Policy in Microsoft Intune

In this article, I’m going to show you how to create a compliance policy in Intune, Microsoft’s Mobile Device Management (MDM) solution, that restricts access to resources to cloud managed and compliant devices only. Even if your devices are registered or joined to Azure Active Directory (AD), there are still risks that could lead to […] Continue reading How to Create a Compliance Policy in Microsoft Intune

Esper raises $30M Series B for its IoT DevOps platform

There may be billions of IoT devices in use today, but the tooling around building (and updating) the software for them still leaves a lot to be desired. Esper, which today announced that it has raised a $30 million Series B round, builds the tools to enable developers and engineers to deploy and manage fleets […] Continue reading Esper raises $30M Series B for its IoT DevOps platform

JumpCloud Adds MFA Capability to Enable Zero-Trust

JumpCloud today announced it is adding a free one-touch multifactor authentication (MFA) capability to its directory to make it simpler to implement a zero-trust IT environment. Greg Keller, JumpCloud CTO, says JumpCloud Protect enables IT organizatio… Continue reading JumpCloud Adds MFA Capability to Enable Zero-Trust

Integre la gestión del ciclo de vida de los certificados con la MDM empresarial y optimice la seguridad de su entorno móvil

Una gran parte de la red corporativa actual se compone de dispositivos móviles, como computadores portátiles, tabletas y teléfonos móviles. Se trata de dispositivos con dominio y sin dominio que requieren acceso a los activos corporativos para llevar … Continue reading Integre la gestión del ciclo de vida de los certificados con la MDM empresarial y optimice la seguridad de su entorno móvil

Cómo una solución de gestión de MDM puede proteger dispositivos móviles en el trabajo digital

Durante la última década muchas organizaciones se adaptaron a un espacio de trabajo digital, sustituyendo las instalaciones de oficinas físicas tradicionales por lugares de trabajo virtuales que incluyen todas las tecnologías que los empleados necesit… Continue reading Cómo una solución de gestión de MDM puede proteger dispositivos móviles en el trabajo digital

5 questions every IT team should to be able to answer

It’s more important than ever to know if your IT team has made sound investments and has the agility needed to operate successfully in the face of continued uncertainty. Continue reading 5 questions every IT team should to be able to answer

Why VPNs on mobile devices are a crucial part of securing access to corporate data

Securing access to business resources has always been of high priority for admins and IT teams. In the wake of the pandemic, workforces are more distributed than ever before, and 76 percent of global office workers state that they would …
The post Why … Continue reading Why VPNs on mobile devices are a crucial part of securing access to corporate data

Google launches Android Enterprise Essentials, a mobile device management service for small businesses

Google today introduced a new mobile management and security solution, Android Enterprise Essentials, which, despite its name, is actually aimed at small to medium-sized businesses. The company explains this solution leverages Google’s experience in building Android Enterprise device management and security tools for larger organizations in order to come up with a simpler solution for […] Continue reading Google launches Android Enterprise Essentials, a mobile device management service for small businesses

Google is Bringing Mobile Management and Security to Smaller Businesses

Android Enterprise Essentials is a new Google offering that provides Android-based secure mobile management to smaller businesses.
The post Google is Bringing Mobile Management and Security to Smaller Businesses appeared first on Thurrott.com.
Continue reading Google is Bringing Mobile Management and Security to Smaller Businesses

ThreatList: Pharma Mobile Phishing Attacks Turn to Malware

After the breakout of the COVID-19 pandemic, mobile phishing attacks targeting pharmaceutical companies have shifted their focus from credential theft to malware delivery. Continue reading ThreatList: Pharma Mobile Phishing Attacks Turn to Malware