Perspectives from Phil Cracknell: detecting mobile security threats
What advantages can end users expect from intelligent device management?
“So machine learning and artificial intelligence lends a hand in this mammoth task of identifying malicious activity. But generally speaking, that is malicious activity or events taking place on our corporate network.
“What about analysing, and trying to detect, anomalous behaviour in terms of the way a user uses their mobile device? To potentially detect a device that’s been stolen before it’s actually reported stolen?”
Play the next video to get Phil Cracknell’s perspective on security in the mobile age and BYOD environments, plus the advantages of using cloud-based security management products for device enrolment.