Mobile Device Manager (MDM)

September 10, 2020

SECURITY

Crossing the Chasm of Remote Access Doesn’t Have to Be Scary

Being tossed across the chasm of remote access and accelerated up the adoption curve doesn’t have to be scary. No one likes feeling a loss of control, but with ISE in place, you and your organization can gain the secure network access that we all need to do more than just survive.

July 24, 2018

THREAT RESEARCH

Advanced Mobile Malware Campaign in India uses Malicious MDM – Part 2

This blog post is authored by Warren Mercer and Paul Rascagneres and Andrew Williams. Summary Since our initial post on malicious mobile device management (MDM) platforms, we have gathered...

July 12, 2018

THREAT RESEARCH

Advanced Mobile Malware Campaign in India uses Malicious MDM

Cisco Talos has identified a highly targeted campaign against 13 iPhones which appears to be focused on India. The attacker deployed an open-source mobile device management (MDM) system to control enrolled devices.

May 5, 2014

SECURITY

The Continuum Approach for Secure Mobility

A couple weeks ago, we spoke about the mobility journey and the phases that organizations take as they embrace the widely accepted mode of mobility—Beyond BYOD to Workspace Mobility (device-focus, application-focus and experience-focus). Whatever phase your organization is in, security is a top priority. These phases can help determine your secure mobility approach but your […]