Collage of Apple Andriod BlackBerry logos

BlackBerry to open secure workspace for Android, iOS

The company said it will soon update Blackberry Enterprise Service 10 to allow separate work and personal environments for third-party devices.

Kyocera Torque 6710

Ultra tough smart phone has tools for field work

The 4G LTE Kyocera Torque 6710 passes the toughest tests for ruggedness while still providing some nice features.

Blackberry in the cloud displaying a communication error message

Tips for moving BlackBerrys along with e-mail to the cloud

At EPA, Lockheed Martin put BlackBerry users through pilot tests before transitioning them to the cloud.

Electronic payments

New electronic payment system could catch on in government

Iowa has adopted Dwolla's real-time, fixed-fee online and mobile payment system and plans to use the platform at all levels of state government.

Businessman using mobile device

Motorola releases secure management tool for Android devices

The company's AME 2000 lets organizations centrally manage encryption and aligns with government security specifications.

Mobile devices on camouflage background

Step two of DOD's mobile strategy outlines pilot projects

The recently released Commercial Mobile Device Implementation Plan lists a range of pilots that could have an impact on the goals of the Mobile Device Strategy.

New Mexico NMRoads map

New Mexico upgrades its Web, mobile experience

The state's transportation department used Adobe Experience Manager, which the company has just updated, to redesign and launch an intuitive website in six months.

USS Kearsarge

Navy's ship-to-ship communications go 4G

The Naval Air Systems Command is testing an LTE network for high-bandwidth ship-to-ship communications.

Businessmen having a private conversation in a tunnel

How to secure mobile comm? Cut out the trusted third party.

The Silent Circle crypto service could solve BYOD security through peer-to-peer encryption, and although that could keep authorities from snooping on calls, military and intelligence agencies are getting on board.

Route 1 Mobikey

Connection tech can secure Apple iOS devices in the enterprise

Route1's MobiLINK lets users securely access applications from iOS devices without having to open a VPN tunnel.

Person reporting a pothole with a smartphone app

Fix 311 puts smart phones to work for the city

The app taps phones' GPS and camera features to let users report potholes, public safety issues and other non-emergency problems to authorities without tying up traditional 311 call centers.

Businessman with smartphone showing apps for work and personal use.

Samsung adds feature to separate work, personal data on smart phones

The new feature, called Knox, takes a comprehensive approach to BYOD security, though it is hardware-dependent.

Topic Resources

  • Avoiding Insider Threats to Enterprise Security

    This white paper explains how IBM Security Privileged Identity Manager provides enhanced security across various IT environments by centralizing and controlling the use of privileged identities.

  • Managing Threats in the Digital Age

    News of recent security failures have not only resulted in significant expense to the affected enterprises, but have significantly damaged consumer trust and brand reputation. The topic of security is now unquestionably a C-suite priority. Organizations must move toward a more systematic, proactive approach to addressing security threats and managing compliance.

  • Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

  • Extending Security Intelligence with Big Data Solutions

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering

  • Integrating Security into Development, No Pain Required

    In this whitepaper, senior SANS Analyst Dave Shackleford discusses new ways developers and security teams can work together to create more efficient quality control processes to improve application functionality and security while minimizing bugs.