<?xml version="1.0" encoding="UTF-8"?> <rss
version="2.0"
xmlns:content="http://purl.org/rss/1.0/modules/content/"
xmlns:wfw="http://wellformedweb.org/CommentAPI/"
xmlns:dc="http://purl.org/dc/elements/1.1/"
xmlns:atom="http://www.w3.org/2005/Atom"
xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
> <channel><title>IPHere &#187; Device</title> <atom:link href="https://www.iphere.com/tag/device/feed" rel="self" type="application/rss+xml" /><link>https://www.iphere.com</link> <description>We show your current IP</description> <lastBuildDate>Wed, 03 Aug 2022 14:13:56 +0000</lastBuildDate> <language>en-US</language> <sy:updatePeriod>hourly</sy:updatePeriod> <sy:updateFrequency>1</sy:updateFrequency> <generator>http://wordpress.org/?v=3.6.1</generator> <item><title>Report: Businesses at risk from unreported mobile device theft</title><link>https://www.iphere.com/report-businesses-at-risk-from-unreported-mobile-device-theft</link> <comments>https://www.iphere.com/report-businesses-at-risk-from-unreported-mobile-device-theft#comments</comments> <pubDate>Thu, 04 Sep 2014 14:13:30 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Businesses]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[from]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Report]]></category> <category><![CDATA[Risk]]></category> <category><![CDATA[Theft]]></category> <category><![CDATA[unreported]]></category> <guid
isPermaLink="false">http://www.iphere.com/report-businesses-at-risk-from-unreported-mobile-device-theft</guid> <description><![CDATA[Part of a company embracing mobile devices is ensuring tools are in place to remotely wipe sensitive data from a smartphone or tablet if it is lost or stolen. A new study from Kaspersky Lab identifies an obvious and concerning fact, though—those tools offer little value if the missing device isn’t reported. Kaspersky Lab surveyed [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/report-businesses-at-risk-from-unreported-mobile-device-theft/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Study: Concern over mobile device theft on the rise</title><link>https://www.iphere.com/study-concern-over-mobile-device-theft-on-the-rise</link> <comments>https://www.iphere.com/study-concern-over-mobile-device-theft-on-the-rise#comments</comments> <pubDate>Fri, 20 Jun 2014 02:13:04 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Concern]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Over]]></category> <category><![CDATA[Rise]]></category> <category><![CDATA[Study]]></category> <category><![CDATA[Theft]]></category> <guid
isPermaLink="false">http://www.iphere.com/study-concern-over-mobile-device-theft-on-the-rise</guid> <description><![CDATA[Have you ever had a smartphone or tablet stolen? The devices&#8217; size and portability makes them prime targets for criminals, and there is a rising trend of people being mugged for their mobile devices. A new study found that consumers are increasingly concerned with the risk of having a mobile device stolen. In the study [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/study-concern-over-mobile-device-theft-on-the-rise/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Novell Jumps Into the Mobile Device Management Pool&#8211;Again</title><link>https://www.iphere.com/novell-jumps-into-the-mobile-device-management-pool-again</link> <comments>https://www.iphere.com/novell-jumps-into-the-mobile-device-management-pool-again#comments</comments> <pubDate>Thu, 26 Jul 2012 14:13:57 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[Into]]></category> <category><![CDATA[Jumps]]></category> <category><![CDATA[Management]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Novell]]></category> <category><![CDATA[PoolAgain]]></category> <guid
isPermaLink="false">http://www.iphere.com/novell-jumps-into-the-mobile-device-management-pool-again</guid> <description><![CDATA[Novell&#8217;s new ZenWorks Mobile Management aims to help enterprises manage their own devices and BYOD policies. Our contributor looks at what it offers, and where it may fall short for some. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/novell-jumps-into-the-mobile-device-management-pool-again/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Pros and Cons of Bringing Your Own Device to Work</title><link>https://www.iphere.com/pros-and-cons-of-bringing-your-own-device-to-work</link> <comments>https://www.iphere.com/pros-and-cons-of-bringing-your-own-device-to-work#comments</comments> <pubDate>Fri, 23 Dec 2011 14:17:50 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Bringing]]></category> <category><![CDATA[Cons]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[Pros]]></category> <category><![CDATA[Work]]></category> <guid
isPermaLink="false">http://www.iphere.com/pros-and-cons-of-bringing-your-own-device-to-work</guid> <description><![CDATA[The concept of “bring your own device” (BYOD) is a growing trend for business IT. There are a variety of benefits to allowing users to supply their own PCs and mobile devices, but there are also some concerns. Make sure you understand both in order to embrace BYOD with confidence. It used to be that [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/pros-and-cons-of-bringing-your-own-device-to-work/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Survey: 35 Percent of Tablet Owners Use Device in the Bathroom</title><link>https://www.iphere.com/survey-35-percent-of-tablet-owners-use-device-in-the-bathroom</link> <comments>https://www.iphere.com/survey-35-percent-of-tablet-owners-use-device-in-the-bathroom#comments</comments> <pubDate>Tue, 23 Aug 2011 20:14:55 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Bathroom]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[Owners]]></category> <category><![CDATA[Percent]]></category> <category><![CDATA[Survey]]></category> <category><![CDATA[Tablet]]></category> <guid
isPermaLink="false">http://www.iphere.com/survey-35-percent-of-tablet-owners-use-device-in-the-bathroom</guid> <description><![CDATA[The phenomenal sales of tablets like the iPad, and the feeding frenzy caused by the HP TouchPad fire sale, indicate significant demand for tablets. A new survey from Staples Advantage takes a look at how and why people use tablets to try and understand what is driving the popularity of tablet devices. The debate rages [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/survey-35-percent-of-tablet-owners-use-device-in-the-bathroom/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Kaseya Unveils Integrated, Automated Mobile Device Management</title><link>https://www.iphere.com/kaseya-unveils-integrated-automated-mobile-device-management</link> <comments>https://www.iphere.com/kaseya-unveils-integrated-automated-mobile-device-management#comments</comments> <pubDate>Tue, 16 Aug 2011 14:12:47 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Automated]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[integrated]]></category> <category><![CDATA[Kaseya]]></category> <category><![CDATA[Management]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Unveils]]></category> <guid
isPermaLink="false">http://www.iphere.com/kaseya-unveils-integrated-automated-mobile-device-management</guid> <description><![CDATA[From a pure revenue perspective, the mobile device management market is just starting to take off, but all indications are it will be a gold mine, so Kaseya is joining the more than 60 vendors already staking a claim in this segment with an integrated and automated solution initially targeted at Apple and Android users. [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/kaseya-unveils-integrated-automated-mobile-device-management/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Core Impact Adds Mobile Device Exploits, Widens Metasploit Integration</title><link>https://www.iphere.com/core-impact-adds-mobile-device-exploits-widens-metasploit-integration</link> <comments>https://www.iphere.com/core-impact-adds-mobile-device-exploits-widens-metasploit-integration#comments</comments> <pubDate>Sat, 06 Aug 2011 14:13:35 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Adds]]></category> <category><![CDATA[Core]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[Exploits]]></category> <category><![CDATA[Impact]]></category> <category><![CDATA[Integration]]></category> <category><![CDATA[Metasploit]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Widens]]></category> <guid
isPermaLink="false">http://www.iphere.com/core-impact-adds-mobile-device-exploits-widens-metasploit-integration</guid> <description><![CDATA[Core Security has introduced mobile device testing and measurement in the latest version of its Core IMPACT penetration testing software. Version 12 also improves Core&#8217; integration with the popular open source Metasploit Framework pen-testing tool. Network Computing]]></description> <wfw:commentRss>https://www.iphere.com/core-impact-adds-mobile-device-exploits-widens-metasploit-integration/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Asigra Adds Mobile Device Support To Cloud Backup</title><link>https://www.iphere.com/asigra-adds-mobile-device-support-to-cloud-backup</link> <comments>https://www.iphere.com/asigra-adds-mobile-device-support-to-cloud-backup#comments</comments> <pubDate>Thu, 09 Jun 2011 20:15:40 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Adds]]></category> <category><![CDATA[Asigra]]></category> <category><![CDATA[backup]]></category> <category><![CDATA[Cloud]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Support]]></category> <guid
isPermaLink="false">http://www.iphere.com/asigra-adds-mobile-device-support-to-cloud-backup</guid> <description><![CDATA[Asigra Inc. announced a new version of the company&#8217;s cloud-based backup and recovery software that now supports handheld devices such as tablets and smartphones, has added improvements intended to make the software more attractive to providers, and provides performance improvements of up to 400 percent, as well as support for 10 Gigabit per second interfaces. [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/asigra-adds-mobile-device-support-to-cloud-backup/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>ISACA Survey: Enterprises Are Addressing Mobile Device Risk</title><link>https://www.iphere.com/isaca-survey-enterprises-are-addressing-mobile-device-risk</link> <comments>https://www.iphere.com/isaca-survey-enterprises-are-addressing-mobile-device-risk#comments</comments> <pubDate>Wed, 01 Jun 2011 20:17:22 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Addressing]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[Enterprises]]></category> <category><![CDATA[ISACA]]></category> <category><![CDATA[Mobile]]></category> <category><![CDATA[Risk]]></category> <category><![CDATA[Survey]]></category> <guid
isPermaLink="false">http://www.iphere.com/isaca-survey-enterprises-are-addressing-mobile-device-risk</guid> <description><![CDATA[U.S. based enterprises are very concerned about the risks that are posed by the influx of personally owned mobile devices in the workplace, and are moving swiftly to put policies in place to control their use and protect the corporate data they hold, according to an IT risk survey conducted by ISACA (Information Systems Audit [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/isaca-survey-enterprises-are-addressing-mobile-device-risk/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> <item><title>Solarwinds Eases Network Device Tracking</title><link>https://www.iphere.com/solarwinds-eases-network-device-tracking</link> <comments>https://www.iphere.com/solarwinds-eases-network-device-tracking#comments</comments> <pubDate>Wed, 01 Jun 2011 08:16:20 +0000</pubDate> <dc:creator>IPHere</dc:creator> <category><![CDATA[General]]></category> <category><![CDATA[Device]]></category> <category><![CDATA[Eases]]></category> <category><![CDATA[Network]]></category> <category><![CDATA[Solarwinds]]></category> <category><![CDATA[Tracking]]></category> <guid
isPermaLink="false">http://www.iphere.com/solarwinds-eases-network-device-tracking</guid> <description><![CDATA[In a move that will help network administrators locate specific user end nodes that might be causing problems, SolarWinds has announced the SolarWinds User Device Tracker. The software works by taking an IP address, host name or Media Access Control (MAC) address, and then responding with information about the device, such as the switch name, [&#8230;]]]></description> <wfw:commentRss>https://www.iphere.com/solarwinds-eases-network-device-tracking/feed</wfw:commentRss> <slash:comments>0</slash:comments> </item> </channel> </rss>