Mobile World Congress 2016

Mobile World Congress is the world’s largest gathering for the mobile industry in Barcelona. Meet with CellTrust in Hall 7, 6A30 at the Samsung booth to learn how CellTrust SecureLine delivers secure SMS and voice solutions to give global enterprises a competitive advantage by balancing mobile productivity, risk and control.

Analytics for mobile security: tools and tips

When it comes to security, mobile devices pose a unique set of challenges. With the number of connected devices growing exponentially, the battle to protect information becomes more complex than ever. As capabilities of smart devices increase, so too does the number of ways to exploit vulnerable data. Read more

Phoenix Business Professional Focuses On Compliance And Security

Some of the most necessary parts of making sure your business runs smoothly are aspects that many people don’t often think about. Making sure your business is compliant with laws and regulations and keeping your company’s information secure are essential to success, but they’re not the glamorous aspects of the business world. K Royal talks … Continue reading Phoenix Business Professional Focuses On Compliance And Security

CES 2016

Meet with CellTrust at the world’s gathering place for all who thrive on the business of consumer technologies. CellTrust SecureLine for Samsung KNOX offers a mobile healthcare communication solution and superior paging capabilities without putting patient confidentiality at risk. Experience a live demo at Booth 11929.

Balancing Security and Privacy in BYOD

According to Forrester Research, more than half of North American and European organizations are developing bring-your-own-device (BYOD) policies in the workplace. However, letting employees use their personal mobile devices for work-related purposes can cause problems relating to company security policies, laws and employee privacy perceptions. Many businesses, for example, have deployed enterprise mobility management (EMM) … Continue reading Balancing Security and Privacy in BYOD

Five Best Practices for Securing Mobile Devices and Everything They Touch

In the span of just one year from 2012 to 2013, smartphone thefts in the U.S. nearly doubled to 3.1 million, according to Consumer Reports. Every one of those losses and thefts could enable multiple security breaches for businesses and organizations. Why? Because confidential data stored on a mobile phone isn’t the only asset that’s … Continue reading Five Best Practices for Securing Mobile Devices and Everything They Touch

Five Best Practices for Securing Mobile Devices and Everything They Touch

In the span of just one year from 2012 to 2013, smartphone thefts in the U.S. nearly doubled to 3.1 million, according to Consumer Reports. Every one of those losses and thefts could enable multiple security breaches for businesses and organizations. Why? Because confidential data stored on a mobile phone isn’t the only asset that’s … Continue reading Five Best Practices for Securing Mobile Devices and Everything They Touch