Posted on 05 August 2015 by Thales DIS
To make sure your virtualized resources remain confidential and truly enable mobile enterprise security, apply Gemalto’s simple Secure the Breach Strategy to your virtual applications, whether in the cloud or data center, or both.
Posted on 12 August 2015 by Thales DIS
Mobile Workforce Security Blog Series – Part 6 Organizations worldwide are seeking greater employee mobility for a variety of business and quality of life reasons. Key to becoming a ‘mobile enterprise’ is the ability to manage and secure the identities and data within an IT ecosystem whose boundaries are becoming increasing blurry. This blog series […]
Posted on 19 August 2015 by Jennifer Dean
luetooth Smart is a viable technology that enterprise IT can easily implement into a current corporate badge ecosystem and addresses the need for balance between security and mobility.
Posted on 29 October 2015 by Thales DIS
The domino effect of technology has always fascinated me – especially when it comes to what prompts the evolution of cyber security solutions and how quick enterprises embrace security best practices. For example, it’s not news that the increasing capabilities of mobile devices and the networks supporting them means employees are able to get more […]
Posted on 15 December 2015 by Jennifer Dean
Employees demand enterprise mobility and want to use personal devices, hence accelerating the bring your own device (BYOD) trend.
Posted on 17 December 2015 by Michal Cohen
Here are a few suggestions to keep in mind in order to accommodate your employees’ demands for better user experience in mobile environments.