Zix Blog

David Kennedy Interviewed about Mobile Devices

Mon, 11/30/2015 - 10:27 by Neil Farquharson
On November 11 th , I had the pleasure of interviewing security expert David Kennedy during a live webcast. David is a regular speaker at security events and famous for co-authoring Metasploit: The Penetration Testers Guide ; and for co-authoring the Penetration Testing Execution Standard (PTES), a framework used by the penetration testing industry. He’s also spoken twice in front of congressional hearings on the subject of network security. During our 40 minute interview, David had much to say on the subject of mobile security, particularly the ease with which BYOD devices that rely on...
Read More

Why Businesses Should Not Trust Remote Wipe or Kill Switch Commands

Fri, 10/23/2015 - 11:17 by Neil Farquharson
I’m becoming increasingly concerned that businesses are relying on the remote wipe instruction to protect their data. Articles like this one from CNET talk about the new Californian law that implements kill-switch functionality on smartphones, while a multitude of articles such as this one from the New York Times espouse remote wipe functionality. However, as I explained in April , these solutions are way off base and do not truly protect company data. Let me explain. The reason for the kill-switch is to deny the thief the future use of the stolen phone. This makes perfect sense to the...
Read More

The Privacy Wars Escalate

Mon, 05/18/2015 - 10:07 by Neil Farquharson
Dear, oh dear! The Privacy Wars escalated on Friday when one country’s Privacy Protection Commission stated that Facebook “tramples on European law.” Once again the issue appears to hinge on what privacy rights people should have. And it is by no means clear that a consensus of these rights will come any time soon. Credit: Frederic Legrand COMEO/Shutterstock.com Earlier in the week I read that Myrna Arias, a former Bakersfield sales executive, allegedly was fired because she removed a GPS location application from her smartphone. Her opinion: "This intrusion would be...
Read More

This Is App Wrapping, Unwrapped

Thu, 01/22/2015 - 10:40 by ZixCorp
There’s a common misperception that just because a mobile device is secured — such as having an “unbreakable” passcode — that the data on the device is also secure. But, there is no such thing as an unbreakable passcode (especially if it’s just limited to four digits). To actually protect data on the device, there needs to be an additional layer of mobile protection. This tends to come in two forms: MDM, which controls the entire device, OR Containerization, which separates the personal from corporate data Both have their pitfalls, ranging from remote wiping to a less-than-stellar user...
Read More

What Enterprise Mobility Management Vendors Aren’t Telling You

Fri, 10/17/2014 - 11:08 by ZixCorp
Last week a few of us at Zix attended the Gartner Symposium ITxpo in Orlando, Fla. From workshops, to keynotes, to roundtables, the four-day event focused on today’s digital world and how it’s redefining IT. ZDNet Editor-in-Chief Larry Dignan attended the conference and shared his thoughts about the on-site Enterprise Mobility Management exhibitors. His key takeaway was that he couldn’t hear through all the white noise and concluded “many vendors sounded alike.” We hear ya Larry (or maybe not, since it IS sounding a little noisy)! He proceeded to write: Simply put, bring your own device (BYOD...
Read More

Supreme Court Exposes Limitations of MDM Solutions

Mon, 07/07/2014 - 10:36 by ZixCorp
We’ve long alluded to the fact that mobile device management (MDM) has its limitations for both businesses and their employees. But hey, don’t take it from us….hear what the Supreme Court had to say in its recent ruling against cellphone searches without a warrant. In the opinion statements, Chief Justice John G. Roberts rejected the argument that evidence won’t be able to be preserved by the police due to phone wiping or encryption: Remote wiping can be fully prevented by disconnecting a phone from the network. There are at least two simple ways to do this . . . He then goes on to describe...
Read More

The Supreme Court’s Mobile Privacy Endorsement…and what it may mean for BYOD

Mon, 06/30/2014 - 10:45 by ZixCorp
This week was a landslide win for supporters of mobile privacy. On Wednesday, the Supreme Court protected mobile privacy rights by ruling 9-0 against cellphone searches without a warrant. While this will impact the 12 million people arrested every year, it’s really just the tip of the iceberg when it comes to defining what’s reasonable in terms of mobile privacy in the digital age. Chief Justice John G. Roberts Jr. set the stage for how cellphones play a role in our everyday lives. Roberts, writing on behalf of the court, stated that cellphones are “such a pervasive and insistent part of...
Read More

How ZixOne Solves BYOD the Right Way

Mon, 06/03/2013 - 14:30 by ZixCorp
The Bring-Your-Own-Device (BYOD) trend snuck up on the world. It’s easy to see how. In five years since its introduction, the smart phone dominates the consumer market with 169 million sold worldwide in a single quarter in 2012. In three years since the first tablet was announced, it has soared in popularity with estimated worldwide sales to reach more than 180 million in 2013. Now those devices are being used for work, and businesses are open to the trend that offers potential cost savings and added productivity. Meanwhile, IT departments are left to make it happen - quickly and securely. To...
Read More
Subscribe to RSS - MDM

Switching to Zix Just Got Better

50 percent or more off your first year when you switch to Zix Email Encryption by Feb. 28, 2017, from an eligible competing solution.

Learn More