
IBM preps Watson to watch enterprise smartphones and IoT devices
IBM has rolled out its Watson cognitive capabilities to do battle with rival enterprise mobile device management (MDM) platforms.
IBM has rolled out its Watson cognitive capabilities to do battle with rival enterprise mobile device management (MDM) platforms.
Many workers who bring their mobile devices to the office don't care about security, which is forcing IT leaders to take action. Some CIOs offer stipends to help cover mobile expenses in return for BYOD compliance. Others are choosing to throw the kill switch on lost or stolen smartphones.
Tom Kaneshige | 07 May | Read more
One day after announcing the Galaxy S5 smartphone with a security-focused fingerprint scanner, Samsung announced that second-generation Knox software for enterprise-level security and management of Samsung devices will ship sometime in the second quarter.
Matt Hamblen | 25 Feb | Read more
In case you haven't been paying attention, the rules for IT admins have changed. Companies generally don't call the shots any more for which technologies are used by employees, and the boundaries of the network have all but disappeared. Citrix recognizes this culture shift and believes the latest release of its XenMobile platform is just what companies need.
Tony Bradley | 29 Oct | Read more
BlackBerry has been in a death spiral, and it's immediate future is a mystery. That is cause for concern for companies that rely on BlackBerry, and has forced businesses to start considering an exit strategy. But the real challenge is finding an alternate platform that doesn't compromise on security. Good Technology thinks it has the solution.
Tony Bradley | 25 Oct | Read more
As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012.
Thor Olavsrud | 24 Dec | Read more
The holidays are nearly here and 2012 is on the way out. It's time to reflect on some of the most popular security stories and tips of the year as we prepare for 2013.
Thor Olavsrud | 20 Dec | Read more
The way corporations operate around mobile devices is currently shifting—employees are starting to use their own devices for business purposes, rather than company-owned devices. With no direct control of the endpoints, IT departments have generally had to prohibit this or risk insecure access inside the firewall. But as more mobile devices appear on the corporate network, mobile device management has become a key IT initiative.