Samsung Knox: The Next Evolution of the Enterprise
[playlist type="video" ids="1790"] Discover the suite of enterprise mobility management solutions built on the award-winning, defense-grade Knox platform. Increase your company’s productivity by deploying and managing Samsung devices with Knox.
Forrester conducted a 3-years, risk-adjusted analysis of how organizations can benefit from using Knox Customization services to streamline device management.
[vc_row][vc_column][vc_column_text]Forrester conducted a 3-years, risk-adjusted analysis of how organizations can benefit from using Knox Customization services to streamline device management. The benefits amounted to an average of USD56,000, including USD41,000 for streamlined customization, configuration and deployment and USD15,000 for expedited re-enrollment
The Star Newspaper reported that cyberattacks have increased dramatically over the past decade in Malaysia.
[vc_row][vc_column][vc_column_text]The Star Newspaper reported that cyberattacks have increased dramatically over the past decade in Malaysia. In 2015 alone, CyberSecurity Malaysia received 9,915 reports on cyber-related incidents. This figure does not include cases that go unreported almost daily. As Malaysia’s Internet penetration
Did you know that one mobile phone is stolen every day in Malaysia?
[vc_row][vc_column][vc_column_text]Did you know that one mobile phone is stolen every day in Malaysia? This shocking report was made by the Malaysian Telecommunications Dealers Organisation (MTDO). While the MTDO is taking pro-active measures to ensure that mobile phone users in the
Skysecure just released a study on cyber-crime concentrated in areas of high traffic, particularly the world’s top tourist destinations such as Times Square, Disneyland Parks and Union Station in Washington.
[vc_row][vc_column][vc_column_text]Skysecure just released a study on cyber-crime concentrated in areas of high traffic, particularly the world’s top tourist destinations such as Times Square, Disneyland Parks and Union Station in Washington. The study revealed that SSL decryption was the most common
Will your company’s cyber-security plan stand up to this reality? Get educated on the new world of enterprise mobility.
[vc_row][vc_column][vc_column_text]A study by Dr. Zinaida Benenson at Friedrich-Alexander University (FAU) of Erlangen-Nuremberg, Germany on mock phishing attacks yielded surprising results: it seems users are even more vulnerable to phishing attacks than we thought! It turned out that 78% of people
Get educated on the new world of enterprise mobility.
[vc_row][vc_column][vc_column_text]A pwc reports that 32% of companies in their study were victims of cyber crime in 2016. It adds that most companies are still not adequately prepared for these attacks. In fact, only 37% of organisations have a cyber incident
Digital traffic continues to increase as we sprint into the Zettabyte Era, with global annual totals projected to triple in three years. By 2020, wireless and mobile device traffic will account for two-thirds of total global IP traffic.
[vc_row][vc_column][vc_column_text]John Stewart, senior vice president, chief security and trust officer of Cisco once said that “Digital traffic continues to increase as we sprint into the Zettabyte Era, with global annual totals projected to triple in three years. By 2020, wireless
Panda Labs reported that in Quarter 3 of 2016 alone, there were 18 million new malware samples were captured.
[vc_row][vc_column][vc_column_text]Panda Labs reported that in Quarter 3 of 2016 alone, there were 18 million new malware samples were captured. Just imagine 200,000 new malwares being found everyday! It continues to evolve to bypass most levels of IT protection, which makes
According to a MacAffee report, SMiShing(SMS phishing) has continued to grow in popularity as a social engineering tool for cybercriminals.
[vc_row][vc_column][vc_column_text]According to a MacAffee report, SMiShing(SMS phishing) has continued to grow in popularity as a social engineering tool for cybercriminals. What SMiShing does is that it tricks the user into clicking on a link in a text message; and that