Five Ways to manage the emerging Security Risks in our increasingly mobile Life

Trustworthy Mobile Security for Smartphones, Tablets, etc. – Is there an App for that? (White Paper)

(PresseBox) ( Markdorf/Bodensee, )
The past ten years have witnessed a remarkable shift in the way that businesses, organisations and individuals can access computing power. The very concept of a “computer” has irrevocably changed.
In the “old days” of 2001, a computer was something that sat on a desk, with a hard drive in a nearby tower. Laptop computers were widely considered to be too expensive or unreliable for everyday use, and were often assigned only to regular business travellers or to the more valuable members of the organisation.
In 2001, smartphones existed (see the photo at right of the Kyocera QCP6035 from the year 2000 ), but they were mainly used by technology enthusiasts and early adopters, and were not nearly as widespread as they are today.
Most people carried “cell phones,” which were big and bulky by today’s standards, and were mainly used only to make phone calls. Simply being able to send a text message was considered the height of cell phone communications technology....

The full White Paper can be read and downloaded unter: http://www.intimus.com/...

For more information please visit our website: www.intimus.com
The publisher indicated in each case is solely responsible for the press releases above, the event or job offer displayed, and the image and sound material used (see company info when clicking on image/message title or company info right column). As a rule, the publisher is also the author of the press releases and the attached image, sound and information material.
The use of information published here for personal information and editorial processing is generally free of charge. Please clarify any copyright issues with the stated publisher before further use. In the event of publication, please send a specimen copy to service@pressebox.de.