<img src="//pixel.quantserve.com/pixel/p-_JKXxuL8SR7wu.gif?labels=_fp.event.Default" style="display: none;" border="0" height="1" width="1" alt="Quantcast">
blog-banner.jpg

Next-Gen CASB Blog

Mobile Security in 2018 – It's Time to Evolve

By Salim Hafid  |  March 28, 2018 at 4:34 AM  | 

When organizations adopt cloud and allow employees to work from mobile devices, they need to begin securing their data in new ways. As corporate information flows to different types of endpoints, different types of tools are needed in order to protect it. It is time for the modern enterprise to evolve and make use of separate security solutions for managed and unmanaged devices – the two can no longer be treated in the same fashion. 

Read More

Agentless Mobile Security: No More Tradeoffs

By Kevin Lee  |  January 25, 2018 at 4:54 AM  | 

Screen Shot 2017-12-11 at 1.06.42 PM-1.png

Have you ever seen a "Pick two out of three” diagram? They present three concepts and force individuals to select the one that they see as the least important. The tradeoffs between convenience, privacy, and security serve as a perfect example of a "Pick two" situation for many mobile security solutions. 

Read More

The $650,649 iPhone Heist

By Rich Campagna  |  March 7, 2017 at 11:26 AM  | 


iphone-4s-elite-close2.jpegLast year, a stolen iPhone cost Catholic Healthcare Services of the Archdiocese of Philadelphia $650,649. Yes, a single iPhone. And no, it wasn't jewel encrusted or wrapped in a pure platinum case. It was a run of the mill iPhone that happened to contain the protected health information (PHI) of 412 nursing home residents. Unfortunately, the iPhone in question was neither encrypted, nor password protected.  The combination of PHI and lack of secure configuration meant a huge (and costly) HIPAA violation. 

Read More

How Enterprise Mobility Management (EMM) Can Annoy Users

By Bitglass  |  June 13, 2016 at 10:00 AM  | 



Video Transcript

Read More