-
Read
Device Management
Blog
Surveys of IT professionals and connected-device users by the security organization ISACA found that most consumers felt confident they could control security on IoT devices, while pros had the opposite view.
Read More
2 minutes read
-
Read
Mobility Strategy
Blog
When most business people think of IT security they think of how policies and technology can restrictive the ability to get their work done., but in the mobility space enterprises have a real opportunity to use good security practices that enable more access to applications ...
Read More
5 minutes read
-
Read
Enterprise Security
Blog
Newly discovered vulnerabilities in the way Android processes MP3 and MP4 files can allow attackers to compromise devices by tricking users to visit specifically-crafted Web pages.
Read More
2 minutes read
-
Read
Device Management
Blog
The average company has more than one gambling application installed on some of its employees' mobile devices, and in some cases as many as 35.
Read More
2 minutes read
-
Read
Device Management
Blog
Workers unsure employers can secure personal data on smartphones and tablets
Read More
2 minutes read
-
Read
Device Management
Blog
Many Android applications collect information on Wi-Fi access points, which researchers contend can be used to figure out where a person is more than 90 percent of the time.
Read More
2 minutes read
-
Read
Enterprise Security
Blog
Three main factors contributed to the increased cost of data breaches in recent years, according to the report, including the increased incidence of cyber-attacks and the growth in the lost business that can result.
Read More
2 minutes read
-
Read
Device Management
Blog
For businesses, increased mobility presents the biggest advantage to employees and the biggest challenge to data security.
Read More
2 minutes read
-
Read
Enterprise Security
Blog
Mobile users in the US are 1.3 times more likely to be struck by lightning than malware, new research has found.
Read More
2 minutes read
Intel® delivers the cutting edge processor technology that powers dell products and solutions, including the Intel®Core™ Processor Family for Dell desktops laptops, tablets and Ultrabooks as well as the Intel® Xeon® Processor E5 Family for Dell servers and workstations. From complex analysis to top-of-the-line reliability, availability and performance, Dell and Intel offer a wide range of solutions with the tools you need to tackle your unique challenges.