Protecting Apple Devices from the checkm8 Exploit
Oct29

Protecting Apple Devices from the checkm8 Exploit

On September 27th, 2019, a security researcher with the twitter handle @axi0mX published an exploit called checkm8, which can bypass Apple’s secure bootchain on specific Apple chipsets by making use of a combination of race conditions and flaws in the Apple Boot ROM. What we know about the exploit • The exploit can only be activated on a tethered device, during a restart in Device Firmware Upgrade (DFU) mode. • Tethered means...

Read More
Coming Soon: Windows Virtual Desktop support in Horizon Cloud on Microsoft Azure
Sep30

Coming Soon: Windows Virtual Desktop support in Horizon Cloud on Microsoft Azure

One year ago, Microsoft announced Windows Virtual Desktop, a platform that combines cloud-native resources with specific product entitlements to deliver a virtual desktop and application experience that resides only in Microsoft Azure. Windows Virtual Desktop announced worldwide general availability today, and we’re very excited because VMware has partnered with Microsoft to extend the features of Windows Virtual Desktop to Horizon...

Read More
The Wait for iOS 13 is Over
Sep19

The Wait for iOS 13 is Over

Apple wrapped up its Fall 2019 Keynote last Tuesday, and with it came details and release dates for the new consumer Apple services, a new Apple Watch, and the first “Pro” iPhone with iPhone 11 Pro. While Apple fans must wait on their new toys, they don’t have to wait any longer for iOS 13. The latest iOS update is now out and will soon be running iPhones everywhere. As we’ve previously written, this is likely Apple’s most important...

Read More
Why companies should not overlook mobile security on iOS devices
Sep12

Why companies should not overlook mobile security on iOS devices

By Roxane Suau, VP Marketing for Pradeo It’s not unusual to hear people say iOS is intrinsically secure. But is this common thinking true? Can’t devices running on iOS be compromised? Correctly answering that question requires us to take multiple criteria into consideration. At a time when lots of companies have equipped their workforce with iOS and more C-levels choose to rely on them, cybercriminals are showing a growing interest in...

Read More
Android Series Ep. 11: Seamless Legacy Android Migration
Sep09

Android Series Ep. 11: Seamless Legacy Android Migration

In late 2017, Google announced that it would deprecate Device Administrator in Android Q. Given that Android Q is going to be released later this year, organizations that have not begun their BYOD Android migration to Android Enterprise are at risk of losing key management capabilities such as password and certain device enforcement rules. We spoke about the impact of device administrator deprecation earlier in the first episode...

Read More
VMworld 2019 Update: Workspace ONE and Okta
Sep05

VMworld 2019 Update: Workspace ONE and Okta

In May 2018, VMware and Okta launched a partnership at Okta’s Oktane to bring together Okta’s best-in-class Identity Management solution with VMware’s best-in-class Unified Endpoint Management solution to help accelerate the digital workspace journey. At every milestone event since, VMware and Okta have demonstrated commitment to the ongoing relationship with the announcement of either new beta availability of features or general...

Read More