Pro IOS Security And Forensics: Enterprise IPho...
We have designed iOS so that its diagnostic functions do not compromise user privacy and security, but still provides needed information to enterprise IT departments, developers and Apple for troubleshooting technical issues," the statement reads.
Pro iOS Security and Forensics: Enterprise iPho...
As the popular smartphone platforms have increased in popularity with consumers, many enterprises and businesses are considering broadening their support beyond their traditionally support platforms. These new smartphone platforms such as iOS and Android, however, come with a lack of detailed understanding of their security features and shortcomings. This presentation is the result of an extended assessment of the security mechanisms and features of Apple's iOS with an emphasis on the concerns of an enterprise considering a deployment of iOS-based devices or allowing employees to store sensitive business data on their personal devices.
According to IDC, 100 million smartphones were shipped in the fourth quarter of 2010, compared to just 92 million computers. With smartphone growth rates continuing to rise, mobile security is a topic fresh on everyone's mind. Security research in the area of mobile devices has also picked up over the last few years with a diversified attack portfolio targeting every level of the mobile security stack. But which of these attack models is the most dangerous to the enterprise? Which carries the most risk? When will the monetization of mobile attacks REALLY occur? What can an organization do to saves themselves?! These and other interesting mobile security questions will be posed to a panel of top mobile security experts in the world. See what happens when they are asked to defend their turf and attack models as the best.
By posting proof that DriveSavers undergoes a company-wide audit on an annual basis, we differentiate ourselves from all other data recovery service providers in the industry today. This audit verifies our adherence to privacy terms and our qualifications to handle enterprise-class recoveries, and support those customers who must maintain compliance with data privacy and data security regulations such as:
Palo Alto Networks is a regular contributor to vulnerability research in the Microsoft, Apple, Android and other ecosystems. By proactively identifying these vulnerabiliites, developing protections for our customers, and sharing the information with the security community, we are removing weapons used by attackers to threaten users and compromise enterprise, government and service provider networks.
Finally, eWeek has a story about a security researcher posting two videos to YouTube (one is here) on how one can access private data on the Apple iPhone 3GS. Apple has been touting its enhanced security features on the iPhone 3GS as a reason enterprises should consider buying them, eWeek says. 041b061a72