Remove endpoint-security mobile-security
article thumbnail

Manage and secure your most vulnerable endpoints: Mobile devices

Jamf

Managing and securing your most vulnerable endpoints, mobile devices requires more than just MDM or mobile threat defense solutions. Admins need to be able to converge these technologies as part of their existing security strategy to ensure a strong, organizational security posture.

MDM 52
article thumbnail

Ivanti Zero-Day Used in Norway Government Breach

Data Breach Today

Flaw in Ivanti Endpoint Manager Mobile Rated 10 on CVSS Scale A mobile security vendor patched a critically rated zero-day vulnerability in its endpoint management platform that had been used by unknown hackers to attack the Norwegian government. The flaw is rated 10 on the CVSS scale.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

New Zero-Day Bug Affects All Versions of Ivanti Sentry

Data Breach Today

Zero-Day Can Be Exploited by Chaining It With Last Month's Ivanti MobileIron Bugs Mobile endpoint security vendor Ivanti disclosed a critical vulnerability that could allow an attacker to take control of an Ivanti Sentry gateway server, which stands between mobile devices and back-end infrastructure.

Security 240
article thumbnail

Jamf Connect feature: Limit Application Access for Unmanaged Devices

Jamf

Strengthening mobile security is critical. Especially for unmanaged devices that lack the management, identity and security controls of managed endpoints. In this blog, learn how Jamf Connect’s newest feature adds a layer of security to protect against unauthorized access and data breaches.

Access 111
article thumbnail

Mosyle Raises $196M to Strengthen Apple Security Platform

Data Breach Today

Mosyle Wants to Expand Beyond MDM and Provide a Holistic Apple Security Platform Mosyle closed a $196 million funding round to expand beyond mobile device management and provide a holistic security platform for Apple devices.

MDM 273
article thumbnail

Author Q&A: Here’s why the good guys must continually test the limitations of ‘EDR’

The Last Watchdog

A new tier of overlapping, interoperable, highly automated security platforms must, over the next decade, replace the legacy, on-premise systems that enterprises spent multiple kings’ fortunes building up over the past 25 years. LW: From a macro level, do security teams truly understand their EDRs? Hand: Yes, 100%.

Cloud 276
article thumbnail

Endpoint and Mobile Top Security Spending at 57% of Businesses

Dark Reading

Businesses say data-at-rest security tools are most effective at preventing breaches, but spend most of their budgets securing endpoint and mobile devices.