Anyone in the security field will tell you that information security is affected and addressed at multiple layers within a solution. As part of the evaluation process for an enterprise business solution, particularly one that enables the transport of potentially sensitive data outside the corporate network, a risk analysis should be conducted. READ MORE
This story, "Can an Enterprise iPhone Really Be Secure?" was originally published by CIO.