IAM Trends: Enterprise security technology essentials (Part 3) Posted on 22 February 2017 by Jennifer Dean in Enterprise Security Enterprise mobility is an increasing IAM trend in the workplace. What are the enterprise security technology options to keep data secure and the mobile workforce… Google, Zero Trust and Securing the Breach Posted on 28 April 2016 by Jason Hart in Enterprise Security Learn why Google's BeyondCorp, its new zero-trust IT security architecture, could be a game-changer and why we expect others to follow its lead. 2016: The Year of the Digital Workforce Posted on 15 December 2015 by Jennifer Dean in Enterprise Security Employees demand enterprise mobility and want to use personal devices, hence accelerating the bring your own device (BYOD) trend. Mobile Endpoint Security and Your Enterprise Mobility Plan Posted on 29 July 2015 by Mor Ahuvia in Enterprise Security Get a few pointers to keep in mind when developing your mobile enterprise security plan. Has your business unwrapped mobile security threats over the festive… Posted on 12 January 2015 by Maria Barbieri in Enterprise Security With new mobile devices like the iPhone 6 and Apple iPad Air 2 topping many present lists this year, we’ve compiled top tips to help… Why Microsoft isn’t to blame for Home Depot’s breach: an… Posted on 14 November 2014 by Jennifer Dean in Enterprise Security Home Depot dealt with its data breach by switching operating system but upon closer inspection it would perhaps have been better to invest in strong… Posts navigation Older posts From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.