RSS feed Get our RSS feed

News by Topic

Three Steps to Mitigate Mobile Security Risks

By: Rapid7
Rapid7

Smartphones and tablets are everywhere. Most companies allow employees to use personal mobile devices to access corporate data, but they typically have very little visibility into which employees are accessing corporate data and what kinds of devices they're using. As a result, they are blind to the risks these devices have to their data.
Based on data from a real life case study, this whitepaper will cover:

* The mobile security landscape and trends
* Key mobile security risks
* A simple step-by-step approach to mitigate mobile security risks and protect company data

Tags : security, network security, cloud, mobile, cloud, byod
 Email this page
Published:  Jan 10, 2013
Length:  5
Type:  Case Study