Enterprise Mobile Security – My Mobile Perspective Posted on 17 December 2015 by Michal Cohen in Enterprise Security Here are a few suggestions to keep in mind in order to accommodate your employees’ demands for better user experience in mobile environments. 2016: The Year of the Digital Workforce Posted on 15 December 2015 by Jennifer Dean in Enterprise Security Employees demand enterprise mobility and want to use personal devices, hence accelerating the bring your own device (BYOD) trend. 5 Ways to Quickly Support Enterprise Mobile Security Posted on 08 July 2015 by Mor Ahuvia in Enterprise Security Key to becoming a ‘mobile enterprise’ is the ability to manage and secure the identities and data within an IT ecosystem whose boundaries are becoming… From Twitter Loading... More from Twitter Subscribe to updates Select a category of interest: All Categories Enterprise SecurityFinancial ServicesGovernmentIoTMobileSoftware Monetization Enter your email address: Delivered by FeedBurner. Submitting this form will open a popup window to the FeedBurner website. Latest comments 11/01/19 @ 04:01 Eva Looks cool to avoid unexpected payment by thieves with a stolen card. More secure09/01/19 @ 10:01 Kareem Excellent series of blog on the topic. Many thanks.09/01/19 @ 10:01 Kareem Thanks for the explanation. It would be helpful if you cover the idea of a primary and secondary device, where LPA sits exactly in this case and what S/W sits on the primary device.