Posts tagged with "BYOD"



New iOS 17 and watchOS 10 Enterprise Features: Everything You Need to Know
Blog | Endpoint Protection · 12. September 2023
At their latest Worldwide Developer Conference (WWDC) this past summer, Apple announced several new features in their soon-to-be-released iOS 17 and watchOS 10, noting an emphasis on communication changes and on-device intelligence. For this blog post, we will focus on the new enterprise features, allowing easier and more advanced management of end-user devices while simultaneously improving the end-user experience and privacy. UEM vendors are currently working on integrating all new enterprise...

Which secure messaging solution to choose?
Blog | Expert's view · 07. September 2022
Companies operating in regulated sectors in the US, like finance or healthcare, are legally required by federal laws to archive all their business communications, including emails, SMS, and other electronic messages; this is an effort to ensure employees are not avoiding or bypassing anti-fraud or antitrust laws. Civilian government and Department of Defense organizations are now being asked to maintain SMS and call logs to comply with records maintenance and FOIA request requirements.

Data Loss Protection vs. Data Leakage Prevention
Blog | Expert's view · 26. July 2022
In a recent blog post, we introduced called Data Loss Protection (DLP), a security component and part of Zero Trust (ZT) architecture that is designed to help corporations protect information and avoid unauthorized data and document exfiltration.

Data Loss Protection (DLP)
Blog | Endpoint Protection · 21. April 2022
According to the 2021 Insider Threat Report by Cybersecurity Insiders, 98% of all organizations are vulnerable to insider threats. It is believed that in recent years insider threats are responsible for around 60% of all compromised systems and data lost.

Bring your own device
11. May 2021
Trying to understand and balance an ownership model for your organization is not always as simple as needing a cost-effective mobile program such as BYOD (Bring Your Own Devices) or being in a regulated industry where your mobile population must be business only (COBO, Corporate Owned, Business Only).

Cloud Access Security Broker (CASB)
24. November 2020
Thanksgiving is just around the corner, and even though COVID-19 will prevent many families and friends from gathering for the holidays, there is still so much for which we should be thankful.