article thumbnail

Mobile device security policy

Tech Republic Security

PURPOSE This Mobile Device Security Policy from TechRepublic Premium provides guidelines for mobile device security needs in order to protect businesses and their employees. This policy can be customized as needed to fit the needs of your organization.

Policies 410
article thumbnail

Mobile Device Security Policy

Tech Republic Security

Mobile devices are commonly used to conduct company business, which can render them more susceptible to risk than desktop or even laptop computers. Desktops are routinely stationary devices and laptops are harder to lose than smartphones or tablets, being more sizable.

Mobile 421
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Alcatel-Lucent Enterprise targets IoT, industrial networks with private 5G package

Network World

MicroSlicing ensures application Quality of Service (QoS) features and guaranteed service level agreements (SLAs) over the wireless network, while Aerloc provides reliable service and policy enforcement for business-critical applications, according to Celona.

Network 386
article thumbnail

Fortinet launches its first standalone endpoint DLP product

Network World

The platform implements origin-based data protection, tracking data movement from endpoints and unmanaged mobile devices to external destinations including USB drives, printers, and cloud applications. Automated classification systems for data identification and real-time policy enforcement mechanisms are also part of the platform.

Policies 418
article thumbnail

6 key mobile and IoT/OT attack trend findings

Network World

Among the fastest-moving frontiers in enterprise cybersecurity: mobile, the internet of things (IoT), and operational technology (OT) systems. of people access the internet with a mobile device, while 59% of internet traffic is generated by mobile devices. Top mobile and IoT/OT targets 5. Today, 96.5%

Mobile 418
article thumbnail

How businesses are reassessing their mobile strategies

Tech Republic Security

Samsung and Oxford Economics study explores how BYOD vs EPD policies can impact SMBs. The post How businesses are reassessing their mobile strategies appeared first on TechRepublic.

Mobile 384
article thumbnail

Cisco, NTT partner to simplify private 5G connectivity

Network World

Specifically, Cisco’s eSIM technology will let customers easily connect devices to the Transatel network, where they can then activate, provision, setup, configure and manage Cisco networking gear to securely connect mobile branches anywhere, the companies stated.

WAN 370