All Mobile Device Management related articles

The fascinating world of mobile devices and MDM

Since BYOD (bring-your-own-device) first emerged, there have been some significant changes in the tech and security industries. Companies and mobile devices manufacturers, as well as mobile operating systems developers, have been challenged to step up their game, especially with the constant innovations and security threats.

The incredible evolution of mobile devices technology

In 1983 the first mobile phone was manufactured and approved by the FCC (Federal Communications Commission) – Motorola DynaTAC 8000X (it offered 30 minutes of talk time) – and since then, the mobile devices industry has come a long way. Between 2007 and 2015 there were 1,423.9m units shipped worldwide to end users and for 2017 the number of mobile phone users is expected to reach 4.77 billion. That is more than half of the worldwide population. There are also estimated to be 19 million mobile app…

Read more

Infographic – Top Data Security Concerns for 2016+

Statistics about Cloud Services, Shadow IT, Wearables, and IoT show that they are amongst the top data security concerns for organizations. Now, more than ever, apps and interconnected devices are part of our lives and, with data moving back and forth between wearables and smartphones / computers, it is no wonder organizations are becoming more vulnerable.

Cloud services like file sharing tools, social media, etc. are a top data security concern for many organizations due to the fast adoption among employees who use them for easy collaboration and uploading / copying files. Most of the time, these services and applications are not authorized by IT departments but through a Data Loss Prevention solution, businesses have the option to limit data transfers only to trusted web addresses.

Shadow IT is a concern for 71% of security professionals, being justified by the fact that uncontrolled…

Read more

The coming of the eSIM

Future smartphones will come with a virtual SIM, meaning without a physical SIM card.

With the introduction of the iPad mini 2 in late 2014 Apple has already started to go in this direction. Since then, iPads in North America are still shipped with a real SIM card but it is not assigned to a carrier, allowing the user to select the carrier.

The next steps involve Apple and Samsung to remove the physical SIM card entirely and use only a virtual SIM (called also eSIM) that will allow them be the providers. Users will have a subscription with Apple, for example, for the cell / data service, instead of having directly with the carrier. Apple might even become a MVNO (meaning a mobile virtual network operator) relying on real carriers infrastructure. The process is similar to Apple Pay relying on Credit Card providers and their infrastructure – it will do the same with mobile carriers.

You might…

Read more

Before wearables thrive in enterprise, consider these cultural and security issues

Wearables are deemed personal devices – those we use to keep track of our fitness progress, stay on top of important notifications, help us sleep better, remind us to eat healthier, and so on. But there is more to wearable devices, as they become part of the BYOD family in the workplace, as well as finding their own niches in the enterprise.

The growing potential of wearables for use in the workplace is getting noticed, one early device being the Motorola WT4000 Wearable System that allows for simplified inventory tracking and on-demand access to product information. Since 2004, Tesco PLC has been utilizing such devices to help employees efficiently take inventory in their various warehouses.
According to recent reports, consumers are interested in owning wearables in exchange for rewards, such as lower insurance rates. Some corporations are tapping in this concept, including Target…

Read more

Stagefright Android bug – general information and future exploits

Recently there have been many articles about the newly discovered Android vulnerability. Although the stories started to appear from the 27th of July, the exploited has been brought to Google’s attention back in April and May by Joshua Drake, a researcher at the mobile security company Zimperium zLabs. It was patched by Google in the latest versions but Android users are not safe yet. So let’s take a look of what Stagefright is/does, what we can do to protect our Android devices and what the future may hold for users.

What is Stagefright?

From a technical point of view, Stagefright is a collection of seven bugs. Their designations are: CVE-2015-1538, CVE-2015-1539, CVE-2015-3824, CVE-2015-3826, CVE-2015-3827, CVE-2015-3828, and CVE-2015-3829. The libraries… Too much info? OK, let’s go with the easier explanation.

Stragefright is a bug that affects ~95% of the Android devices…

Read more

Mobile Device Management – Not just for security

There is no doubt that a Mobile Device Management (some call it Enterprise Mobility Management) Solution can help any organization safeguard their mobile employees and help navigate the BYOD-related pitfalls. Besides increasing productivity for the workforce in the field, a Mobile Device Management solution makes things easier for the IT admins that have to manage the mobile device fleet. However, an MDM tool can do much more.

A wide range of opportunities with Kiosk Mode

Enabling Kiosk Mode on an Android device (our Endpoint Protector MDM does this very well for Samsung devices) doesn’t require an MDM solution. It does, however, become essential when it comes to taking full advantage of all the benefits and cost savings Kiosk enabled mobile devices can bring. Having a smartphone or tablet locked into a single or only a few applications can turn an affordable device into a dedicated…

Read more