Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Sunday, 2 April, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

IBM set to bolster mobile management with acquisition of Fiberlink

by The Gurus
November 22, 2013
in Editor's News
Share on FacebookShare on Twitter

IBM has announced a definitive agreement to acquire mobile management and security company Fiberlink Communications.

Expanding IBM’s MobileFirst portfolio, the deal would see IBM offer the MaaS360 cloud-based management solution and be part of more than 100 cloud services. IBM said that upon completion, it planned to offer MaaS360 on the IBM SoftLayer cloud infrastructure. Financial terms were not disclosed.
IBM said that the acquisition will offer all of its mobile resources together in one platform, with IBM Worklight, IBM Security AppScan, Tealeaf and Trusteer already offered. Additionally, the combination of IBM Endpoint Manager and MaaS360 will allow IBM to offer Unified Device Management, supporting either SaaS or on-premise deployments for all of an organization’s endpoints.
Robert LeBlanc, IBM senior vice president of Middleware Software, said: “In a mobile first world, clients require a comprehensive mobile management and security offering. Often times they integrate solutions on their own and take on unnecessary risk. To protect and enhance the complete mobile experience, it’s crucial to secure the app, user, content, data and the transaction.
“The acquisition of Fiberlink will enable us to offer these expanded capabilities to our clients, making it simple and quick to unlock the full potential of mobility.”
Jim Sheward, CEO of Fiberlink, said: “While the proliferation of mobile devices provides great flexibility and agility for organisations, it also increases the complexity to manage and protect corporate data.
“We are looking forward to becoming part of IBM’s strategy to put mobile first and deliver holistic mobile device and app management and security for today’s always-connected workforce.”
FacebookTweetLinkedIn
ShareTweetShare
Previous Post

More than a million impacted by loyalty card breach

Next Post

Subdivision of Chicago Tribune hit by Serbian hackers

Recent News

Data Privacy Day: Securing your data with a password manager

For Cybersecurity, the Tricks Come More Than Once a Year

March 31, 2023
cybersecurity training

Only 10% of workers remember all their cyber security training

March 30, 2023
Pie Chart, Purple

New API Report Shows 400% Increase in Attackers

March 29, 2023
Cato Networks delivers first CASB for instant visibility and control of cloud application data risk

Cato Networks Recognised as Leader in Single-Vendor SASE Quadrant Analysis

March 29, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information