Free Newsletter
Register for our Free Newsletters
Newsletter
Zones
Access Control
LeftNav
Alarms
LeftNav
Biometrics
LeftNav
Detection
LeftNav
Deutsche Zone (German Zone)
LeftNav
Education, Training and Professional Services
LeftNav
Government Programmes
LeftNav
Guarding, Equipment and Enforcement
LeftNav
Industrial Computing Security
LeftNav
IT Security
LeftNav
Physical Security
LeftNav
Surveillance
LeftNav
View All
Other Carouselweb publications
Carousel Web
Defense File
New Materials
Pro Health Zone
Pro Manufacturing Zone
Pro Security Zone
Web Lec
 
 
Mobile computing security
Remote data kill switch could prevent stolen laptop data loss
Mobile computing security : 18 June, 2008
Latest high profile loss of government laptop highlights need for measures to prevent sensitive data from falling into the wrong hands, something which can be achieved by remote data disabling
 
Roaming fraud detection solution enjoys widespread adoption
Mobile computing security : 12 June, 2008
The detection and prevention of roaming fraud becomes global with the majority of GSM network providers opting for MACH
 
Additional laptop security features from OmniAccess 3500 NLG
Mobile computing security : 11 June, 2008
Corporate mobile workers gain additional protection for their laptops with the latest release of OmniAccess 3500 which now includes full disk encryption
 
Corporate mobile device management
Mobile computing security : 11 June, 2008
Enterprises have the ability of managing and protecting mobile IT systems including laptops and handheld devices, thus affording a greater level of protection for data in motion
 
Mobile encryption for London primary care trust
Mobile computing security : 09 June, 2008
NHS trust in London area secures patient data with full disk encryption software for laptops and all removable media
 
Back up functionality added to Symbian security product
Mobile computing security : 06 June, 2008
PhoneWallet version 2.0 improves password control and other security features for S60 v3 users including new functionality for data back up and restoration
 
PGP encryption protects William Hill data
Mobile computing security : 05 June, 2008
UK betting shop chain to protect mobile data regarding clients and finances on company laptops using PGP Encryption Platform
 
Secure VPN access for iPhones
Mobile computing security : 04 June, 2008
VPN gateway available from Check Point for transmitted encrypted corporate data to mobile users using iPhones
 
Smartphone weaknesses eclipse laptop lethargy
Mobile computing security : 02 June, 2008
Startling results of survey amongst IT professionals reveals lax approach to mobile endpoint security and significant security weaknesses in corporate smartphone deployments
 
Mobile social networking changes face of company security
Mobile computing security : 19 May, 2008
Companies which allow access to social networking as a business tool need to take different aspects of security into account for employees who access social networking sites from mobile devices.
 
Mobile Guardian contributes to considerable growth at Credant.
Mobile computing security : 08 May, 2008
Symantec integration with Mobile Guardian and central management of endpoint protection drives growth for Credant Technologies.
 
Spam anniversary sees increase in unwanted mobile spam
Mobile computing security : 01 May, 2008
Rise in mobile spam creates demand for software to protect mobile users from unwanted e-mail and phishing attacks.
 
Multiple security applications on one embedded processor card
Mobile computing security : 22 April, 2008
Laptop security improved with Gatekeeper Card Pro designed to slot into the ExpressCard position and delivering a range of security features.
 
Five main threats to data on medical patients highlighted.
Mobile computing security : 18 April, 2008
Laptop protection is paramount in the healthcare industry according to Absolute Software who reveal the five most significant threat to the sensitive data they contain.
 
Claims Tested Mark certification for Mobile Guardian Enterprise.
Mobile computing security : 17 April, 2008
Government quality accreditation achieved by Mobile Guardian Enterprise after extensive testing.
 
Shoulder surfing a recognised problem for technology journalists.
Mobile computing security : 15 April, 2008
Survey of commuting journalists by 3M reveals the need for laptop privacy filters to prevent fellow passengers from reading across their shoulders.
 
Endpoint encryption through IT adminstration console.
Mobile computing security : 14 April, 2008
Integration between Mobile Guardian and Altiris enables endpoint encryption tasks to be performed through a management console.
 
Mobile two factor authentication
Mobile computing security : 09 April, 2008
One time passwords over RSA authentication manager can be distributed by text message for mobile two factor authentication requirements.
 
Laptop privacy survey of travelling IT journalists.
Mobile computing security : 18 March, 2008
3M reveals corporate data privacy concerns in using laptops in public places and gives away free privacy filters to first 250 visitors to the 3M stand at InfoSecurity Europe.
 
New VPN client offered for Symbian OS-based mobile devices.
Mobile computing security : 12 March, 2008
NCP Engineering provides users of Symbian OS-based mobile devices with secure access to the company network.
 
Mobile and remote working trend poses fresh security challenges.
Mobile computing security : 12 March, 2008
Ian Kilpatrick examines why the move towards remote and mobile working seems to be an unstoppable trend.
 
Providing security for remote workers
Mobile computing security : 12 March, 2008
Ian Kilpatrick of Wick Hill Group reports on the current state of security for the mobile workforce and remote users.
 
Privacy filters for secure mobile working
Mobile computing security : 12 March, 2008
3M assists in the prevention of shoulder surfing endured by mobile workers by providing a Privacy Filter designed to offer clarity of vision for the user whilst blacking out the screen image for onlookers.
 
Secure IT access for international charity workers.
Mobile computing security : 06 March, 2008
Network access with information security is an important aspect of life for Marie Stopes charity employees who are spread around the globe in diverse locations.
 
High security connectivity for mobile operators.
Mobile computing security : 06 March, 2008
WatchGuard SSL 500 and 1000 provide secure VPN connectivity for mobile workers in remote locations.
 
Pocket PC access to VPN with firewall.
Mobile computing security : 05 March, 2008
Strong security for hand held devices enabled by universal VPN client with firewall for Palm Treo 750v.
 
Software virtualisation collaboration with ChangeBASE.
Mobile computing security : 05 March, 2008
Symantec enters the world of software virtualisation in alliance with ChangeBASE to reduce testing times and ownership costs.
 
Parental SMS linked to school register deters truants.
Mobile computing security : 04 March, 2008
Truancy at Essex school reduced to negligible levels following installation of text messaging server by Avanquest linked to the school register to inform parents of absent children.
 
Two factor mobile phone based authentication for John Lewis chain.
Mobile computing security : 03 March, 2008
Strong IT resource access control can now be achieved in the John Lewis retail chain using SecureEnvoy's mobile phone based password token system.
 
Remote security management for mobile devices.
Mobile computing security : 03 March, 2008
Laptop security in Europe takes a leap forward with the availability of OmniAccess laptop guardian for HSDPA networks providing remote security management and data protection.
 
Unauthorised bluetooth access prevention.
Mobile computing security : 29 February, 2008
Series 60 software for Bluetooth enabled devices protects from unauthorised access attempts.
 
AdaptiveMobile cuts out SMS spam for Etisalat customers.
Mobile computing security : 25 February, 2008
Emirates mobile phone operator employs SMS policy filter for its subscribers to remove the risk of receiving overseas based SMS spam
 
Remote access brings worker benefits during threat of transport strikes.
Mobile computing security : 20 February, 2008
SecurEnvoy argues that business preparation plans should include improved remote access capabilities to their servers in cases of industrial action by transport workers.
 
Research by McAfee indicates growing concern over mobile security.
Mobile computing security : 11 February, 2008
Mobile operators seen by majority as being responsible for providing a secure platform for mobile users to operate on according to McAfee survey.
 
Parental control for mobile devices.
Mobile computing security : 11 February, 2008
AdaptiveMobile provides a means for parents to exercise control over use of mobile phones such as site blocking, SMS restrictions and the ability to block certain numbers.
 
Pornographic spam targeted mobile users.
Mobile computing security : 06 February, 2008
Lack of access controls and age verification enables suppliers of advertising material for adult content to target mobile users warns AdaptiveMobile.
 
Laptop securing ring for car boots.
Mobile computing security : 05 February, 2008
Avanquest develop laptop anti-theft securing system for deterring thieves from taking computers from car boots.
 
BeCrypt data security chosen for Cygnia customers.
Mobile computing security : 31 January, 2008
Cygnia Technologies to supply customers with BeCrypt security products to enable secure remote working.
 
Legal IT show venue for Blackberry business continuity solution.
Mobile computing security : 30 January, 2008
Avanquest and Neverfail use Legal IT show to demonstrate disaster recovery capability for Blackberry users.
 
Privacy filters for laptop computers.
Mobile computing security : 28 January, 2008
3M exhibits privacy filters at Business Travel Show for use by travellers to ensure mobile computing security.
 
Laptop Guardian ÃÂÃâ€ÂÃ…"killsÃÂÃâ€Âàcontents if device is stolen or missing.
Mobile computing security : 24 January, 2008
Alcatel-Lucent develops remote cleansing system for stolen laptops as alternative to preventing employees from using mobile devices for the purpose for which they were designed.
 
Secure operating system on USB device.
Mobile computing security : 23 January, 2008
Trusted Client V2.0 enables devices to be booted from a USB flash drive into a trusted operating system.
 
Symbian worm discovered.
Mobile computing security : 22 January, 2008
Mobile users warned of new worm threatening Symbian operating system as uncovered by Fortinet.
 
Additional platforms now supported by iAnywhere.
Mobile computing security : 22 January, 2008
Mobile users receive rapid deployment capabilities for protection of mobile devices over multiple platforms.
 
StudentÃÂÃâ€ÂÃâ€Âs stolen laptop recovered by police using ComputraceOne.
Mobile computing security : 21 December, 2007
ComputraceOne laptop tracking software from Absolute software led to the recovery of a student's computer and also to an arrest and recovery of further stolen laptops.
 
Bluetooth security for mobile phones.
Mobile computing security : 17 December, 2007
BT Guard from Symbian Guru protects mobile users from intrusions using the Bluetooth interface and is simple to use.
 
Security software for Symbian phones
Mobile computing security : 11 December, 2007
Confidential data can be secured on mobile phones using the latest release of phone wallet for Symbian phones.
 
Mobile E-mail unauthorised access protection.
Mobile computing security : 11 December, 2007
iAnwhere now provides protection for mobile e-mail users with access control for Microsoft Exchange.
 
Two factor one time password protection for remote users.
Mobile computing security : 28 November, 2007
Remote IT access control more secure with BiGuard two factor authentication device from Billion which includes one time password generation functionality.
 
AdaptiveMobile recommends mobile protection software designed for the task.
Mobile computing security : 27 November, 2007
Increasing threats on mobile handset users from writers of malicious code require protection software specifically designed for the task rather than generic PC software, argues AdaptiveMobile.
 
First | Prev  | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11  | Next  | Last
 
Home I Editor's Blog I News by Zone I News by Date I News by Category I Special Reports I Directory I Events I Advertise I Submit Your News I About Us I Guides
 
   © 2012 ProSecurityZone.com
Netgains Logo