Quantcast
Channel: Armor5 » Mobile Device Management (MDM)
Browsing all 10 articles
Browse latest View live

How We Achieve Zero Touch BYOD

As a technical guy, I find it is often a bit difficult to understand what a company’s product actually does by reading the corporate website. Of course that’s not true with our website! But in the...

View Article



13 Reasons Not to Use Armor5 (humor)

[ Our marketing guy wants me to explicitly tell you that this post is meant to be funny and there are not actually 13 real reasons not to use Armor5. Oh boy, disclaimers on humor! ] So here are 13...

View Article

Why We Founded Armor5

Armor5 was born out of a simple need: to provide secure access from any device. Employees enjoy the ability to access corporate assets from a device of their choice. IT security professionals enjoy the...

View Article

User Privacy & BYOD: Why MDM Doesn’t Cut It

In Tom Kaneshige’s article in CIO Magazine, BYOD Lawsuits Loom as Work Gets Personal, he discusses the legal implications of deploying Mobile Device Management (MDM) software to your employees’...

View Article

BYOD Policy Enforcement Gets the Dilbert Treatment (video)

Has it come to this? BYOD has reached a tipping point in the enterprise, with 74% of companies reporting in a recent survey by Osterman Research that they will have a BYOD program and policy this year....

View Article


SaaS Providers Can Increase MRR Solving the “Last Mile” Security Problem

Anyone in the telecom industry is very familiar with the “last mile” problem. Early use of the term in the 20th Century referred to the fact that it was easy to string telegraph or telephone poles from...

View Article

CIOs Must Act on BYOD Threat

A whopping 86 percent of BYOD-ers say they access or save work-related information on their mobile device. Some 5 percent of users admitted losing a personal device used for work, either forgetting it...

View Article

Image may be NSFW.
Clik here to view.

Enterprise with 1000 employees can save over $225,000 per year on enterprise...

In todays always on mobile work environment, you want your workforce to be productive. They should be able to access their applications and content whenever they need it, where ever they are without...

View Article


Image may be NSFW.
Clik here to view.

Keeping Enterprise Mobile Apps Secure

Andrew Borg, in his article How To Keep Enterprise Mobile Apps Secure, correctly points out that mobile apps must be treated as essential parts of an enterprise security ecosystem that extends from the...

View Article


Aiming for Zero Gap – How to Enable Cloud and Mobile Data Access While...

A Blog Series by Guest Writer – Scott Wright, CISA: “The Streetwise Security Coach” Introduction to our Armor5 guest blogger: Scott Wright is a long-time security blogger, coach and consultant, and a...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images