Also interesting: News from the Virtual Solution Blog
When company data is stored on a smartphone or tablet, it needs special protection – because it’s at special risk. SecurePIM combines five measures in one streamlined solution. Find out more about data protection on business smartphones.
This blog describes how the phishing method has developed and been perfected. It also shows why mobile devices are the perfect target for phishing.
We present two different approaches: MDM and container solutions. Comparisons show that container solutions are indispensable.
Follow us on your preferred Social Media channel and stay up to date on topics like secure mobile work, webinars and blog posts.