Tag Archives: mobile security

How Device Certificates Secure our Mobile Identities

April 14, 2014 by Entrust, Inc.     No Comments

A quick look at our world today reveals that the need for mobile security has never been greater. After all, the number of activated mobile devices has actually surpassed the population of our planet. For the people who use them — which is just about everybody — such devices permeate every aspect of life. These [Read More...]

Playing in the Digital Sandbox: Mobile versus Desktop Security

January 27, 2014 by Jason Soroko     No Comments

Mobile operating systems consume resources from unknown sources on the Internet all the time, and yet they are not infected in the same manner as desktop operating systems. Certainly, sideloaded malicious Android apps are able to access parts of a mobile device that the user has authorized (e.g., pictures, contacts, SMS).  We have also seen [Read More...]

Filed Under: Malware, Mobility Tagged With: mobile security, sandbox

Top 10 Holiday Scams to Steer Clear of this Season – Part 2

December 16, 2013 by Entrust, Inc.     No Comments

This is Part 2 of a two-part series. To read the first post, click here. Top 10 Holiday Scams to Steer Clear of this Season 6. Order shipment notification When doing your holiday shopping, always make sure that the email notification confirming your order shipment is directly tied to the official company of which you [Read More...]

Top 10 Holiday Scams to Steer Clear of this Season – Part 1

December 12, 2013 by Entrust, Inc.     1 Comment

Top 10 Holiday Scams to Steer Clear of this Season You have spent all night looking for the perfect gift online for your spouse, children or significant other. After hours of searching, you finally come across the ultimate package certain to grant you a lifetime pass to the Nice List — two tickets to the [Read More...]

Filed Under: Mobility Tagged With: holiday, mobile security

A Glance at Mobile Security: The Trusted Execution Environment

August 15, 2013 by Entrust, Inc.     No Comments

As the global workforce continues to mobilize, many processes that were once typically run from applications based on an internal server are now conducted with remote devices. IT executives, therefore, must count on such devices to provide adequate protection against any malicious activity that might interfere with critical business processes. When it comes to mobile [Read More...]

Is Your Mobile Device Secure?

August 12, 2013 by Andrew Wagner     No Comments

Infographic Visualizes Truth on Mobile Security Our world is becoming faster and more portable every day. I can picture an 80-year-old version of myself mindlessly rambling about a time where you could only send 200 text messages a month, but only if your parents trusted you enough to upgrade your service plan. Meanwhile, my grandkids [Read More...]

What Do You Want from Mobile?

April 9, 2013 by Mike Byrnes     No Comments

Building on an already robust suite of mobile solutions , Entrust just announced version 2.0 of our Mobile Smart Credential. This new release includes a few very cool features that help organizations deploy stronger, more effective security controls and improve the end-user experience. This makes security that is simple rather than a frustrating barrier that gets in the way of business.

Mobile and Security – No Longer Mutually Exclusive

April 2, 2013 by Matthew Lewis     No Comments

In December, Entrust and Forrester began work on a Technology Adoption Profile (TAP) whitepaper centering on mobile. As organizations have begun to accept the inevitable — the eventuality of mobile devices permeating networks and infrastructures — they are looking to address mobile security as a whole and not as siloed device types (e.g., corporate- and employee-owned). With this in mind, the report discusses bring-your-own-device (BYOD) and corporate-owned devices together.

Entrust at RSA: Secure Mobile, Leverage Mobile

February 26, 2013 by Entrust, Inc.     No Comments
This entry is part 4 of 9 in the series Entrust at RSA Conference 2013

During RSA Conference 2013 at Booth 1139 this week, Entrust authentication experts Mike Moir and Mike Byrnes are showing how organizations are able to deploy a two-pronged approach to not only secure mobile identities and transactions, but also leverage mobile devices to secure the online channel.

Layered Security USING your Mobile Device

June 12, 2012 by Mike Byrnes     No Comments

A natural extension to my last post, I find it interesting that most people intuitively see the need to secure mobile devices, applications and transactions, but they are likely unaware of the incredible power and convenience mobile devices present in terms of serving as a security device themselves. Increasingly, mobile devices are used for more [Read More...]