Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Sponsors
  • More from Cyentia

MobileIron

Below you will find reports with the source of “MobileIron”

image from Trouble at the Top: Why the C-Suite is the weakest link when it comes to cybersecurity

Trouble at the Top: Why the C-Suite is the weakest link when it comes to cybersecurity

A commissioned survey of 300 IT decision makers and 50 C-suite members on C-suite attitudes towards mobile device security attitudes.

(more available)
Added: June 22, 2020
image from What iOS11 Means To The Enterprise

What iOS11 Means To The Enterprise

This report offers insight into iOS11 and how Apple technology is providing useful resources to enterprises that are moving away from PC’s.

(more available)
Added: October 21, 2018
image from The Criminal Justice Information Services Compliance For Mobile Devices

The Criminal Justice Information Services Compliance For Mobile Devices

This is a guide to the Criminal Justice Information Services Compliance For Mobile Devices.

Added: October 20, 2018
image from Securing macOS In The Modern Work Era

Securing macOS In The Modern Work Era

This report offers insight into how to best secure Macintosh computers in the modern workplace.

Added: October 19, 2018
image from Mobile Threat Detection Through Machine Learning

Mobile Threat Detection Through Machine Learning

This paper is subtitled “Discover the ideal technology dor detecting unknown, zero-day mobile threats.

Added: October 18, 2018
image from Enterprise Guide To iOS App Development

Enterprise Guide To iOS App Development

This paper provides a helpful guide to iOS App development for the enterprise.

Added: October 17, 2018
image from Demystifying Cloud EMM: Why A Distributed And Secure Cloud Architecure Matters

Demystifying Cloud EMM: Why A Distributed And Secure Cloud Architecure Matters

This paper seeks to simplify Cloud security and offers some solutions to the issues that an enterprise might deal with.

(more available)
Added: October 16, 2018
image from Executive Briefing Series: Mobile Cyber Security

Executive Briefing Series: Mobile Cyber Security

This is a brief introduction to Mobile Cyber Security

Added: October 16, 2018
image from Cloud Best Practices:Audit Checklist For Endpoint Security

Cloud Best Practices:Audit Checklist For Endpoint Security

This 10-point checklist outlines best practices for designing a security architecture that protects cloud data at the endpoint. Enterprise computing architectures have changed fundamentally in the last ten years, as employees consume an ever-growing collection of business cloud services through mobile apps. The traditional security approach of network perimeter and locked-down endpoints is not suitable for this app-to-cloud model of modern work.

(more available)
Added: October 15, 2018
image from Android Is Ready For The Enterprise

Android Is Ready For The Enterprise

This report offers insight into Android and its use in the modern enterprise.

Added: October 14, 2018
image from 5 Steps To Executing A Mobile Defense Strategy

5 Steps To Executing A Mobile Defense Strategy

This paper provides a simple guide to executing a mobile defense strategy.

Added: October 13, 2018
© Cyentia Institute 2025
Library updated: July 9, 2025 00:09 UTC (build b1d7be4)