COVID-19, referred to the Novel Coronavirus, is globally affected over 100,000 people direcly and millions indirectly. For years we’ve heard in Information Security that “the perimeter is dead,” but now is the time that we test it as some companies look at completely closing physical access to buildings at scale during the Movement Control Order. The IT perimeter definitely exists; we can point to firewalls and DMZs and a loose correlation in most companies between some types of digital assets and the physical boundaries of the company. But the believe that the perimeter can stop serious, advanced attacks has long […] Read more
Mobile scanning devices are making it easier and faster to scan one or multiple barcodes. Tasks that used to take minutes now take seconds.
With the Samsung Galaxy Tab Active2 and Scandit software, scanning with a device anywhere at any time is now easier and faster than ever. Whether you need to scan packages on the road or in the warehouse, the rugged-built Tab Active2 can withstand almost anything — including extreme temperatures, moisture and high altitude — while Samsung Knox ensures your data stays secure.
See how easy it is to scan with mobile scanning devices like the Galaxy Tab Active2 with Scandit in this episode […] Read more
Each element of mobile security, including physical, network, data and device, are mutually dependent. Learn more about how SOTI MobiControl provides a comprehensive solution to meet all of your business mobile security needs.
[…] Read more
Mobile apps have changed the way we work by providing new channels of communication, innovating customer engagement, and empowering organizations with critical data in real-time. Samsung Knox devices include a set of productivity apps for both personal and business use.
Business-critical apps include Samsung Email, Internet browser, Calendar, and Contacts. Enterprise IT admins can secure these apps within the Knox Workspace, along with other apps used by the enterprise.
The Knox Platform secures enterprise apps and protects con app data through these methods:
App installations and updates:
Apps are pre-inst within the mobile device’s secure Knox Workspace a can update these apps independent of […] Read more