Locking down mobile security in the enterprise

With the potential to free staff from the confines of the office and make them more efficient and productive on the move, mobile communications are moving up the corporate agenda. But, while enabling smarter working practices, mobile technologies can also increase security risks. An exclusive Computer Weekly roundtable, in association with Vodafone, discussed how organisations can address these issues.

This Article Covers

Mobile

Download now

With the potential to free staff from the confines of the office and make them more efficient and productive on the move, mobile communications are moving up the corporate agenda. But, while enabling smarter working practices, mobile technologies can also increase security risks. An exclusive Computer Weekly roundtable, in association with Vodafone, discussed how organisations can address these issues.

  • Mobile security risks
  • Communicate the importance of mobile security
  • The true value of mobile data
  • Return on investment
  •  

 

This was last published in November 2009

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on Mobile hardware

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Passive Python Network Mapping

    In this excerpt from chapter two of Passive Python Network Mapping, author Chet Hosmer discusses securing your devices against ...

  • Protecting Patient Information

    In this excerpt from chapter two of Protecting Patient Information, author Paul Cerrato discusses the consequences of data ...

  • Mobile Security and Privacy

    In this excerpt from chapter 11 of Mobile Security and Privacy, authors Raymond Choo and Man Ho Au discuss privacy and anonymity ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close