Mobile Security

Business & Technology Breakfast

Feb 18, 2014: Managing Identities and Access to Information for Cloud, Mobile and Social Computing

Cloud Computing, Mobile Computing and Social Computing - each of these trends have been around for some time. But what we see now, is the convergence of those forces, creating strong new business opportunities and changing the way we use information technology to interact with our customers…

Blog

Mobile Security: Virtualization on the smartphone

LG recently announced a new platform called GATE that will enable some LG business smartphones to run two mobile operating systems in parallel. LG appears, with this feature, to be reacting to the security concerns many organizations have around BYOD (Bring Your Own Device). Virtualization…

Executive View

Executive View: F5 Mobile App Manager - 70802

There are various approaches to tackle the BYOD challenge, from MDM (Mobile Device Management) to specialized, secure apps - for instance for email - virtualization approaches on mobile devices, and network security. However, despite the vendor promises there is no single solution that…

Webcast

Panel Discussion - Next Generation Cloud and Mobile Identity Management

Session at the European Identity & Cloud Conference 2013 May 15, 2013 10:30

Blog

Information Stewardship and BYOD news for you

Two documents crossed my desk this week – a survey and a “planning guide” – which fit nicely with two recent papers from KuppingerCole, illustrating a need and (unknowingly) confirming our conclusions. The first is about the current buzzword acronym BYOD (for “Bring Your Own Device”) which…

Advisory Note

Advisory Note: BYOD - Bring Your Own Device - 71003

Bring Your Own Device (or “BYOD” for short) may seem like the latest hype, but in fact it isn’t really all that new. Employees have been bringing their smartphones or iPads to work for quite some time now, mostly with their employers’ explicit (or at least implicit)…

Webcast

BYOD, Social Networking, Cloud - sicher und kalkulierbar

KuppingerCole Webinar recording

Webinar

Mar 07, 2013: BYOD, Social Networking, Cloud - sicher und kalkulierbar

Die Einbindung mobiler Endgeräte, seien Sie im Eigentum des Mitarbeiters oder des Unternehmens, die Nutzung von Social Media im Unternehmen und der vielfältige Einsatz von Cloud-Anwendungen - all dies ist Alltag geworden und stellt IT-Professionals in den Unternehmen jeden Tag vor neue…

Discover KuppingerCole

KuppingerCole Select

Register now for KuppingerCole Select and get your free 30-day access to a great selection of KuppingerCole research materials and to live trainings.

Blog

Blog

How to Train Your AI to Mis-Identify Dragons

This week Skylight Cyber disclosed that they were able to fool a popular “AI”-based Endpoint Protection (EPP) solution into incorrectly marking malware as safe. While trying to reverse-engineer the details of the solution's Machine Learning (ML) engine, the researchers found that it contained a secondary ML model added specifically to whitelist certain types of software like popular games. Supposedly, it was added to reduce the number of false positives their "main engine" was [...]

Stay Connected

Latest Insights

Hot Topics

Become a Client

Learn more about becoming a Client

Contact Us

Call Us

+49 211 2370770
Mo - Fr 8:00 - 17:00