{"id":23331,"date":"2022-08-08T12:48:33","date_gmt":"2022-08-08T10:48:33","guid":{"rendered":"https:\/\/www.ikarussecurity.com\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/"},"modified":"2025-03-31T17:01:23","modified_gmt":"2025-03-31T15:01:23","slug":"mobile-device-management","status":"publish","type":"page","link":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/","title":{"rendered":"Mobile Device Management"},"content":{"rendered":"<div id='av-layout-grid-1'  class='av-layout-grid-container av-junymveb-810ad1ce854c84e404d415892b37fc36 entry-content-wrapper main_color av-flex-cells  avia-builder-el-0  el_before_av_layout_row  avia-builder-el-first   container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyesco-3fa81cdc3278102296255fa3cf46819f\">\n.flex_cell.av-junyesco-3fa81cdc3278102296255fa3cf46819f{\nvertical-align:middle;\nheight:400px;\nmin-height:400px;\nbackground:url(https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/Mobile_Device_Management.jpg) 0% 0% no-repeat scroll #ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junyesco-3fa81cdc3278102296255fa3cf46819f{\npadding:0px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyesco-3fa81cdc3278102296255fa3cf46819f av-gridrow-cell av_one_half no_margin  avia-builder-el-1  el_before_av_cell_one_half  avia-builder-el-first  content-align-middle av-zero-padding avia-full-stretch'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a\">\n.flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\nvertical-align:top;\nheight:400px;\nmin-height:400px;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a{\npadding:60px 30px 60px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-junyrmwc-31a561d8e9a544598fcc7c5e8941167a av-gridrow-cell av_one_half no_margin  avia-builder-el-2  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><p>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-kf3r3gs7-d8a63756b0beefa92cf91cc1ac179001\">\n#top .av-special-heading.av-kf3r3gs7-d8a63756b0beefa92cf91cc1ac179001{\npadding-bottom:25px;\ncolor:#ffffff;\nfont-size:34px;\n}\nbody .av-special-heading.av-kf3r3gs7-d8a63756b0beefa92cf91cc1ac179001 .av-special-heading-tag .heading-char{\nfont-size:25px;\n}\n#top #wrap_all .av-special-heading.av-kf3r3gs7-d8a63756b0beefa92cf91cc1ac179001 .av-special-heading-tag{\nfont-size:34px;\n}\n.av-special-heading.av-kf3r3gs7-d8a63756b0beefa92cf91cc1ac179001 .special-heading-inner-border{\nborder-color:#ffffff;\n}\n.av-special-heading.av-kf3r3gs7-d8a63756b0beefa92cf91cc1ac179001 .av-subheading{\nfont-size:15px;\n}\n\n@media only screen and (min-width: 480px) and (max-width: 767px){ \n#top #wrap_all .av-special-heading.av-kf3r3gs7-d8a63756b0beefa92cf91cc1ac179001 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n\n@media only screen and (max-width: 479px){ \n#top #wrap_all .av-special-heading.av-kf3r3gs7-d8a63756b0beefa92cf91cc1ac179001 .av-special-heading-tag{\nfont-size:0.8em;\n}\n}\n<\/style>\n<div  class='av-special-heading av-kf3r3gs7-d8a63756b0beefa92cf91cc1ac179001 av-special-heading-h3 custom-color-heading blockquote modern-quote  avia-builder-el-3  el_before_av_textblock  avia-builder-el-first  av-inherit-size'><h3 class='av-special-heading-tag '  itemprop=\"headline\"  >What is Mobile Device Management and how does it work?<\/h3><div class='av_custom_color av-subheading av-subheading_below'><p>Definition, functions, benefits and possible uses of an MDM<\/p>\n<\/div><div class=\"special-heading-border\"><div class=\"special-heading-inner-border\"><\/div><\/div><\/div><br \/>\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-jzxrpyhp-7a8ec958993576b6bf15cfa402a78925\">\n#top .av_textblock_section.av-jzxrpyhp-7a8ec958993576b6bf15cfa402a78925 .avia_textblock{\ncolor:#ffffff;\n}\n<\/style>\n<section  class='av_textblock_section av-jzxrpyhp-7a8ec958993576b6bf15cfa402a78925 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock av_inherit_color'  itemprop=\"text\" ><div class=\"FFpbKc\">\n<div class=\"dePhmb\" aria-live=\"polite\">\n<div class=\"eyKpYb\" data-language=\"en\" data-original-language=\"de\" data-result-index=\"0\">\n<div class=\"J0lOec\"><span class=\"VIiyi\" lang=\"en\"><span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"de\" data-phrase-index=\"0\" data-number-of-phrases=\"5\"><span class=\"Q4iAWc\">The abbreviation MDM stands for Mobile Device Management and describes a software system that enables the central administration and protection of mobile devices.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"de\" data-phrase-index=\"1\" data-number-of-phrases=\"5\"><span class=\"Q4iAWc\">It is traditionally used in companies to securely integrate smartphones, tablets and laptops into the company network.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"de\" data-phrase-index=\"2\" data-number-of-phrases=\"5\"><span class=\"Q4iAWc\">Central functions are monitoring, protection of data on the devices and in the network as well as distribution of software and software updates.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"de\" data-phrase-index=\"4\" data-number-of-phrases=\"5\"><span class=\"Q4iAWc\">Additional features such as malware detection, device location and remote control, containerization to separate private and professional data, and policy management and reporting make the MDM the perfect tool for meeting EU GDPR requirements.<\/span><\/span><\/span><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/section><\/p>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-2'  class='av-layout-grid-container av-junyy33y-ebc4019e7b6877f5936d4d5958e59ead entry-content-wrapper main_color av-flex-cells  avia-builder-el-5  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junyw8vu-4853268eebab2336dfbb5674b206345b\">\n.flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\nvertical-align:top;\nbackground-color:#d4300f;\n}\n.responsive #top #wrap_all .flex_cell.av-junyw8vu-4853268eebab2336dfbb5674b206345b{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junyw8vu-4853268eebab2336dfbb5674b206345b av-gridrow-cell av_one_half no_margin av-hide-on-mobile  avia-builder-el-6  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf\">\n.flex_cell.av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf{\nvertical-align:top;\nbackground-color:#ef5737;\n}\n.responsive #top #wrap_all .flex_cell.av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf{\npadding:9px 0px 0px 0px !important;\n}\n<\/style>\n<div class='flex_cell av-junywu9f-a644aaa809a28abe3ff70b1e0944f1bf av-gridrow-cell av_one_half no_margin  avia-builder-el-7  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><\/div><\/div>\n<\/div>\n<div id='av-layout-grid-3'  class='av-layout-grid-container av-rr8gnv-2a82409bb660cd53e3b737094bcdc1fe entry-content-wrapper main_color av-flex-cells  avia-builder-el-8  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-40d124bf51e00fb6b81190effb73a35c\">\n.flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-40d124bf51e00fb6b81190effb73a35c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-40d124bf51e00fb6b81190effb73a35c av-gridrow-cell av_one_half no_margin  avia-builder-el-9  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-df09f41b24320aa5ee205afa40d3768b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Enterprise mobility management: controlled security, more flexibility and relief for IT<\/h3>\n<p>Mobile working and home office has been part of everyday life in many companies since Covid-19 at the latest. Mobile end devices such as smartphones or tablets are part of the basic technical equipment.<\/p>\n<p>For IT, more end devices with different operating systems mean, on the one hand, an increased security and data protection risk that needs to be addressed and compensated for. On the other hand, setting up and managing the additional devices creates additional work that should not be underestimated. Compliance with the EU GDPR proves to be particularly critical: Once the devices are out of hand, the status of the devices and applications is unknown. The mobile operating systems hardly support data protection and data separation.<\/p>\n<p>An EMM (Enterprise Mobility Management) or MDM (Mobile Device Management) addresses all of these problems: It takes care of the system integration, monitors the device status, regulates data access and enables remote maintenance.<\/p>\n<p><strong>Read more: <\/strong><a href=\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/enterprise-mobility-management-has-become-an-indispensable-part-of-everyday-it-life\/\">Prepare your IT routines and IT security for mobile work<\/a><\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-44368r-7d5bcd9749ab1a06556f23ebf538c280\">\n.flex_cell.av-44368r-7d5bcd9749ab1a06556f23ebf538c280{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-44368r-7d5bcd9749ab1a06556f23ebf538c280{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-44368r-7d5bcd9749ab1a06556f23ebf538c280 av-gridrow-cell av_one_half no_margin  avia-builder-el-11  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-l1c9lq2z-cce2b445c50f729427771f12228dc37a\">\n.avia-image-container.av-l1c9lq2z-cce2b445c50f729427771f12228dc37a img.avia_image{\nbox-shadow:none;\n}\n.avia-image-container.av-l1c9lq2z-cce2b445c50f729427771f12228dc37a .av-image-caption-overlay-center{\ncolor:#ffffff;\n}\n<\/style>\n<div  class='avia-image-container av-l1c9lq2z-cce2b445c50f729427771f12228dc37a av-styling- avia-align-center  avia-builder-el-12  avia-builder-el-no-sibling '   itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" ><div class=\"avia-image-container-inner\"><div class=\"avia-image-overlay-wrap\"><img fetchpriority=\"high\" class='wp-image-20589 avia-img-lazy-loading-not-20589 avia_image ' src='https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/03\/mdm-1200.jpg' alt='MDM' title='MDM'  height=\"900\" width=\"1200\"  itemprop=\"thumbnailUrl\"  \/><\/div><\/div><\/div>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-4'  class='av-layout-grid-container av-rr8gnv-17-e3429ebb49e301eb773aa534c4cbba5e entry-content-wrapper main_color av-flex-cells  avia-builder-el-13  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-16-710f6f2f757322379c29b046354eb975\">\n.flex_cell.av-3z0k63-16-710f6f2f757322379c29b046354eb975{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-16-710f6f2f757322379c29b046354eb975{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-16-710f6f2f757322379c29b046354eb975 av-gridrow-cell av_one_half no_margin  avia-builder-el-14  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-15-491ad17323281b98b7ad90d1d215b704 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>This is how you enable mobile working and master the challenges of the EU GDPR<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-7817\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small-205x300.jpg\" alt=\"Symbolbild Homeoffice\" width=\"205\" height=\"300\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small-205x300.jpg 205w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small.jpg 427w\" sizes=\"auto, (max-width: 205px) 100vw, 205px\" \/><\/p>\n<p>Around 80 percent of companies access the Internet and company data with portable devices. Mobile working is a concern for many employers and employees &#8211; be it business trips or field work, the desire for more flexibility or simply the additional use of smartphones and tablets.<\/p>\n<p>Both customers and partner companies want their data to be kept safe and well protected. While workstations and server landscapes usually already have tried and tested security precautions, the use of mobile devices poses new, sometimes complex challenges for IT &#8211; starting with the fact that these are more difficult to keep track of and some non-company devices access company data.<\/p>\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/seamless-data-protection-even-with-mobile-working\/\">Seamless data protection even with mobile working<\/a><\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-44368r-14-16099657575353617d0ddd3985cbc89f\">\n.flex_cell.av-44368r-14-16099657575353617d0ddd3985cbc89f{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-44368r-14-16099657575353617d0ddd3985cbc89f{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-44368r-14-16099657575353617d0ddd3985cbc89f av-gridrow-cell av_one_half no_margin  avia-builder-el-16  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jyzx0kqa-85a070b3fdd049724b7f7cb66e189c9e '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Principles of the EU GDPR when handling personal data and what this means for companies<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-10229\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/dsgvo-300x212.png\" alt=\"dsgvo\" width=\"300\" height=\"212\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/dsgvo-300x212.png 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/dsgvo-1030x728.png 1030w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/dsgvo-768x543.png 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/dsgvo-1536x1086.png 1536w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/dsgvo-1500x1060.png 1500w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/dsgvo-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/dsgvo-705x498.png 705w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/dsgvo-450x318.png 450w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/dsgvo.png 1920w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><span class=\"VIiyi\" lang=\"en\"><span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"de\" data-phrase-index=\"0\" data-number-of-phrases=\"6\"><span class=\"Q4iAWc\">The EU General Data Protection Regulation requires a lot from companies dealing with sensitive data.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"de\" data-phrase-index=\"1\" data-number-of-phrases=\"6\"><span class=\"Q4iAWc\">According to Article 32 (\u201cSecurity of processing\u201d), for example, companies must verifiably ensure that suitable organizational and technical security requirements based on the state of the art are also observed on mobile devices.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"de\" data-phrase-index=\"3\" data-number-of-phrases=\"6\"><span class=\"Q4iAWc\">All risks and security precautions must also be assessed and documented according to Article 35 (&#8220;Data protection impact assessment&#8221;), and Article 32 paragraph 1d) also requires &#8220;Procedures for regularly checking, assessing and evaluating the effectiveness of technical and organizational measures to ensure the security of the<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"de\" data-phrase-index=\"4\" data-number-of-phrases=\"6\"><span class=\"Q4iAWc\">Processing&#8221;.<\/span><\/span> <span class=\"JLqJ4b ChMk0b\" data-language-for-alternatives=\"en\" data-language-to-translate-into=\"de\" data-phrase-index=\"5\" data-number-of-phrases=\"6\"><span class=\"Q4iAWc\">IT departments face new challenges.<\/span><\/span><\/span><\/p>\n<p><strong>Read more: <\/strong><a href=\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/eu-gdpr-compliance-security-and-data-protection-to-go\/\">EU-GDPR Compliance: Security and Data Protection To-Go<\/a><\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-5'  class='av-layout-grid-container av-rr8gnv-13-4a6dc6622c301799a8f49648ab4dbe8b entry-content-wrapper main_color av-flex-cells  avia-builder-el-18  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-44368r-10-b719761ddab29313885bad632cad2955\">\n.flex_cell.av-44368r-10-b719761ddab29313885bad632cad2955{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-44368r-10-b719761ddab29313885bad632cad2955{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-44368r-10-b719761ddab29313885bad632cad2955 av-gridrow-cell av_one_full no_margin  avia-builder-el-19  avia-builder-el-no-sibling  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jyzx0kqa-9-dd5a156ad20701d08b80b4c9a866d42b '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-portfolio wp-image-3735\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2019\/08\/Fotolia_93036451_M-495x400.jpg\" alt=\"IKARUS mobile.management\" width=\"495\" height=\"400\" \/><\/p>\n<h3>Complete solution to optimize and secure your mobile communication and work processes<\/h3>\n<p>Laptops and smartphones support our mobility and productivity. At the same time, data security and the legal framework must be guaranteed. The balancing act between strict specifications and flexible use requires an intelligent solution.<\/p>\n<p><strong>IKARUS mobile.management<\/strong> allows simple and quick tailored solutions to be created for the efficient management of your mobile devices, applications and data. The cloud service is equally suitable for small companies and for enterprises \u2013 any amount of end devices can be connected. Invoicing is dependent on the number of licences. The benefit of security: All data is processed only in servers located in Austria in the ISO-certified data-processing centre Interxion in Vienna (ISO27001 and BS25999). Austrian and EU data protection laws apply in their entirety.<\/p>\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/\">Mobility solutions for corporate environments<\/a><\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-6'  class='av-layout-grid-container av-rr8gnv-8-34d41ef1919128d25d6dfe4254c18a12 entry-content-wrapper main_color av-flex-cells  avia-builder-el-21  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-12-c002039566a7e180479dbb4b0374b7a9\">\n.flex_cell.av-3z0k63-12-c002039566a7e180479dbb4b0374b7a9{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-12-c002039566a7e180479dbb4b0374b7a9{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-12-c002039566a7e180479dbb4b0374b7a9 av-gridrow-cell av_one_half no_margin  avia-builder-el-22  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-11-c276cdd20c1e97858867bd7e4dc8a2ad '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Focus on quality and reliability &#8211; a success story<\/h3>\n<p><a href=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/01\/Suzuki-043-web.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-7221\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/01\/Suzuki-043-web-300x200.jpg\" alt=\"Gerhard Eber, ICT-Manager SUZUKI AUSTRIA (\u00a9 Lukas Dostal)\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/01\/Suzuki-043-web-300x200.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/01\/Suzuki-043-web-768x512.jpg 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/01\/Suzuki-043-web-705x470.jpg 705w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/01\/Suzuki-043-web-450x300.jpg 450w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/01\/Suzuki-043-web.jpg 1000w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>SUZUKI relies on the highest quality standards with a focus on customers, relationships and the environment. Suzuki also works quickly and precisely behind the scenes.<\/p>\n<p><a href=\"https:\/\/www.ikarussecurity.com\/managed-it-ot-security-solutions\/mobile-management\/\">IKARUS mobile.management<\/a> ensures optimal mobility in the Austrian dealer network: Within a few days, with the setup of the MDM solution, complete transparency was created for all mobile devices and compliance with the EU GDPR was guaranteed.<\/p>\n<p><strong>Read more<\/strong>: <a href=\"https:\/\/www.ikarussecurity.com\/en\/success-stories\/suzuki-austria\/\">Light, precise, fast and safe: The SUZUKI mobile fleet<\/a><\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-44368r-7-682afbdd05ccbfb6f118c590fff9c60c\">\n.flex_cell.av-44368r-7-682afbdd05ccbfb6f118c590fff9c60c{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-44368r-7-682afbdd05ccbfb6f118c590fff9c60c{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-44368r-7-682afbdd05ccbfb6f118c590fff9c60c av-gridrow-cell av_one_half no_margin  avia-builder-el-24  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jyzx0kqa-6-e8f4f825bbe80721d8c2434fcfca8f31 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3>Behind the scenes: Android malware analyst Tibor Elias<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-20378 alignright\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-hell2-300x300.jpg\" alt=\"Tibor \u00c9li\u00e1s\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-hell2-300x300.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-hell2-1030x1030.jpg 1030w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-hell2-80x80.jpg 80w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-hell2-768x768.jpg 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-hell2-36x36.jpg 36w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-hell2-180x180.jpg 180w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-hell2-705x705.jpg 705w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/01\/Tibor-1200-hell2.jpg 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>For more than six years, Tibor \u00c9li\u00e1s has been disassembling Android malware. As a malware analyst, he has witnessed how mobile threats have evolved and spread over the last few years.<\/p>\n<blockquote>\n<p>\u201cA good malware analyst keeps up with the rapid developments and always finds new ways to fend off attacks.\u201d<\/p>\n<\/blockquote>\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/www.ikarussecurity.com\/en\/portrait-en\/tibor-elias\/\">Going deep &#8211; Tibor \u00c9li\u00e1s, Android Senior Malware Analyst at IKARUS Security Software about malware, puzzle pieces and real successes.<\/a><\/p>\n<\/div><\/section>\n<\/div><\/div>\n<\/div>\n<div id='av-layout-grid-7'  class='av-layout-grid-container av-rr8gnv-5-f30cc1ef9ffbe31e9f41e995b5f21678 entry-content-wrapper main_color av-flex-cells  avia-builder-el-26  el_after_av_layout_row  el_before_av_layout_row  grid-row-not-first  container_wrap fullsize'  >\n\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-3z0k63-4-44ec0c72b950ae6d5b5bbf8a28f19dd7\">\n.flex_cell.av-3z0k63-4-44ec0c72b950ae6d5b5bbf8a28f19dd7{\nvertical-align:top;\nbackground-color:#f4f4f4;\n}\n.responsive #top #wrap_all .flex_cell.av-3z0k63-4-44ec0c72b950ae6d5b5bbf8a28f19dd7{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-3z0k63-4-44ec0c72b950ae6d5b5bbf8a28f19dd7 av-gridrow-cell av_one_half no_margin  avia-builder-el-27  el_before_av_cell_one_half  avia-builder-el-first  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jxna5an0-3-d043b789b288a23bd7305fa657573354 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><h3><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-10253\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/fakebank2-225x300.png\" alt=\"fakebank\" width=\"225\" height=\"300\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/fakebank2-225x300.png 225w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/fakebank2.png 365w\" sizes=\"auto, (max-width: 225px) 100vw, 225px\" \/><\/h3>\n<h3>Tricks and deception maneuvers of mobile attackers<\/h3>\n<p>It&#8217;s so easy for criminals to get your data and your money: Tibor \u00c9li\u00e1s, Android malware expert at IKARUS, uses the &#8220;FakeBankApp&#8221; specially programmed for this purpose to analyze and demonstrate how infected apps can access your bank data unnoticed.<\/p>\n<p>A short but deep insight into how malware works on Android &#8211; including expert tips and recommendations for securing your own apps<\/p>\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/www.ikarussecurity.com\/en\/mobile-device-management-en\/mobile-overlay-attacks-on-android\/\">Mobile overlay attacks on Android<\/a><\/p>\n<\/div><\/section>\n<\/div><\/div>\n<style type=\"text\/css\" data-created_by=\"avia_inline_auto\" id=\"style-css-av-44368r-2-2a1cb43715c5acaf28024f52e4cbe7c3\">\n.flex_cell.av-44368r-2-2a1cb43715c5acaf28024f52e4cbe7c3{\nvertical-align:top;\n}\n.responsive #top #wrap_all .flex_cell.av-44368r-2-2a1cb43715c5acaf28024f52e4cbe7c3{\npadding:30px 30px 30px 30px !important;\n}\n<\/style>\n<div class='flex_cell av-44368r-2-2a1cb43715c5acaf28024f52e4cbe7c3 av-gridrow-cell av_one_half no_margin  avia-builder-el-29  el_after_av_cell_one_half  avia-builder-el-last  content-align-top'  ><div class='flex_cell_inner'><section  class='av_textblock_section av-jyzx0kqa-1-fd09bd96a4de43341c63682df6287593 '   itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><div class='avia_textblock'  itemprop=\"text\" ><p><img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-10233\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/machine-690190_1920-300x200.jpg\" alt=\"Sicherheitstools\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/machine-690190_1920-300x200.jpg 300w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/machine-690190_1920-1030x687.jpg 1030w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/machine-690190_1920-768x512.jpg 768w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/machine-690190_1920-1536x1024.jpg 1536w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/machine-690190_1920-1500x1000.jpg 1500w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/machine-690190_1920-705x470.jpg 705w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/machine-690190_1920-450x300.jpg 450w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/09\/machine-690190_1920.jpg 1920w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<h3>Free security tools for Android devices<\/h3>\n<p>The <strong>IKARUS TestVirus<\/strong> is NOT a real virus, just a harmless test app with the EICAR Standard Anti-Virus Test File. The app can be used to test the functionality of security apps and to be able to observe the behavior of the app in the event of a threat.<\/p>\n<p><strong>Read more:<\/strong> <a href=\"https:\/\/play.google.com\/store\/apps\/details?id=com.ikarus.ikarustestvirus\" target=\"_blank\" rel=\"noopener\">IKARUS TestVirus on Google Play<\/a><\/p>\n<\/div><\/section>\n<\/div><\/div><\/div><div id='av-layout-grid-8'  class='av-layout-grid-container av-3uw0y3-8a6fbbc83af3de59d9476fc65d542127 entry-content-wrapper main_color av-flex-cells  avia-builder-el-31  el_after_av_layout_row  avia-builder-el-last  grid-row-not-first  container_wrap fullsize'  >\n<div class='flex_cell av-28g47f-fdf21df6a448102433a3d72aa95bda50 av-gridrow-cell av_one_full no_margin  avia-builder-el-32  avia-builder-el-no-sibling '  ><div class='flex_cell_inner'><div  data-slideshow-options=\"{&quot;animation&quot;:&quot;fade&quot;,&quot;autoplay&quot;:false,&quot;loop_autoplay&quot;:&quot;once&quot;,&quot;interval&quot;:&quot;5&quot;,&quot;loop_manual&quot;:&quot;manual-endless&quot;,&quot;autoplay_stopper&quot;:false,&quot;noNavigation&quot;:false,&quot;show_slide_delay&quot;:90}\" class='avia-content-slider avia-content-slider-active avia-content-slider1 avia-content-slider-even  avia-builder-el-33  avia-builder-el-no-sibling  av-slideshow-ui av-control-default   av-no-slider-navigation av-slideshow-manual av-loop-once av-loop-manual-endless '  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Blog\" ><div class=\"avia-content-slider-inner\"><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-39223 slide-entry-overview slide-loop-1 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/hacktivism-ethical-hacking-and-grey-hats-between-protection-protest-and-crime\/' data-rel='slide-1' class='slide-image' title='Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/02\/Ethical-Hacking-260x185.png\" class=\"wp-image-39212 avia-img-lazy-loading-not-39212 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Ethical Hacking\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/02\/Ethical-Hacking-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/02\/Ethical-Hacking-600x430.png 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/hacktivism-ethical-hacking-and-grey-hats-between-protection-protest-and-crime\/' title='Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime'>Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2025-02-04T11:47:35+01:00\" >4. February 2025<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2025\/02\/Ethical-Hacking.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>600<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-08-08T12:48:33+02:00\" >2025-02-04 11:47:35<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-20 11:12:04<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Hacktivism, Ethical Hacking and Grey Hats: Between Protection, Protest and Crime<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-35470 slide-entry-overview slide-loop-2 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/mitre-attck-framework-and-evaluations\/' data-rel='slide-1' class='slide-image' title='MITRE ATT&#038;CK Framework and Evaluations'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/09\/MITRE-ATTCK-Framework-260x185.png\" class=\"wp-image-35459 avia-img-lazy-loading-not-35459 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"MITRE ATT&amp;CK Framework\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/09\/MITRE-ATTCK-Framework-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/09\/MITRE-ATTCK-Framework-600x430.png 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: MITRE ATT&amp;CK Framework and Evaluations\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/mitre-attck-framework-and-evaluations\/' title='MITRE ATT&#038;CK Framework and Evaluations'>MITRE ATT&#038;CK Framework and Evaluations<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2024-09-25T18:09:09+02:00\" >25. September 2024<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2024\/09\/MITRE-ATTCK-Framework.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>600<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-08-08T12:48:33+02:00\" >2024-09-25 18:09:09<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-20 11:19:36<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>MITRE ATT&#038;CK Framework and Evaluations<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-31301 slide-entry-overview slide-loop-3 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/harmony-mobile-new-in-the-ikarus-portfolio\/' data-rel='slide-1' class='slide-image' title='Harmony Mobile new in the IKARUS portfolio'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"87\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/11\/Harmony-Mobile-300-260x87.png\" class=\"wp-image-31268 avia-img-lazy-loading-not-31268 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Harmony Mobile by Check Point\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Harmony Mobile new in the IKARUS portfolio\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/harmony-mobile-new-in-the-ikarus-portfolio\/' title='Harmony Mobile new in the IKARUS portfolio'>Harmony Mobile new in the IKARUS portfolio<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-11-15T10:01:25+01:00\" >15. November 2023<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/11\/Harmony-Mobile-300.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>87<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-08-08T12:48:33+02:00\" >2023-11-15 10:01:25<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-27 12:03:25<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Harmony Mobile new in the IKARUS portfolio<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-29321 slide-entry-overview slide-loop-4 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/data-loss-prevention-protecting-data-from-loss-and-unauthorised-access\/' data-rel='slide-1' class='slide-image' title='Data Loss Prevention: Protecting data from loss and unauthorised access'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/07\/data-loss-prevention-260x185.png\" class=\"wp-image-29316 avia-img-lazy-loading-not-29316 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Data Loss Prevention\" srcset=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/07\/data-loss-prevention-260x185.png 260w, https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/07\/data-loss-prevention-600x430.png 600w\" sizes=\"(max-width: 260px) 100vw, 260px\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Data Loss Prevention: Protecting data from loss and unauthorised access\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/data-loss-prevention-protecting-data-from-loss-and-unauthorised-access\/' title='Data Loss Prevention: Protecting data from loss and unauthorised access'>Data Loss Prevention: Protecting data from loss and unauthorised access<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-07-07T11:08:37+02:00\" >7. July 2023<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/07\/data-loss-prevention.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>600<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-08-08T12:48:33+02:00\" >2023-07-07 11:08:37<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-30 10:02:45<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Data Loss Prevention: Protecting data from loss and unauthorised access<\/span><\/span><\/span><\/article><\/div><div class=\"slide-entry-wrap\"><article class='slide-entry flex_column  post-entry post-entry-27689 slide-entry-overview slide-loop-5 slide-parity-odd  av_one_fourth first real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/location-tracking-risks-from-location-data\/' data-rel='slide-1' class='slide-image' title='Location tracking: Risks from location data'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/04\/location-tracking-260x185.jpg\" class=\"wp-image-27686 avia-img-lazy-loading-not-27686 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"location tracking\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Location tracking: Risks from location data\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/location-tracking-risks-from-location-data\/' title='Location tracking: Risks from location data'>Location tracking: Risks from location data<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-04-24T14:57:46+02:00\" >24. April 2023<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/04\/location-tracking.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-08-08T12:48:33+02:00\" >2023-04-24 14:57:46<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-30 10:47:07<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Location tracking: Risks from location data<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-27170 slide-entry-overview slide-loop-6 slide-parity-even  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/tiktok-ban-on-business-devices\/' data-rel='slide-1' class='slide-image' title='Tiktok ban on business devices?'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/03\/t-verbot-260x185.jpg\" class=\"wp-image-27167 avia-img-lazy-loading-not-27167 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"Tiktok-Verbot auf Diensthandys\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Tiktok ban on business devices?\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/tiktok-ban-on-business-devices\/' title='Tiktok ban on business devices?'>Tiktok ban on business devices?<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2023-03-14T11:57:49+01:00\" >14. March 2023<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2023\/03\/t-verbot.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-08-08T12:48:33+02:00\" >2023-03-14 11:57:49<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-06-30 10:49:27<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Tiktok ban on business devices?<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-25778 slide-entry-overview slide-loop-7 slide-parity-odd  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/6-tips-how-companies-can-recognise-and-prevent-insider-threats\/' data-rel='slide-1' class='slide-image' title='6 tips how companies can recognise and prevent insider threats'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/12\/insider-threat-260x185.png\" class=\"wp-image-25611 avia-img-lazy-loading-not-25611 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"insider threat\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: 6 tips how companies can recognise and prevent insider threats\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/6-tips-how-companies-can-recognise-and-prevent-insider-threats\/' title='6 tips how companies can recognise and prevent insider threats'>6 tips how companies can recognise and prevent insider threats<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-12-19T18:51:41+01:00\" >19. December 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/12\/insider-threat.png<\/span>\n\t\t\t\t\t\t<span itemprop='height'>300<\/span>\n\t\t\t\t\t\t<span itemprop='width'>300<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-08-08T12:48:33+02:00\" >2022-12-19 18:51:41<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-07-23 10:49:15<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>6 tips how companies can recognise and prevent insider threats<\/span><\/span><\/span><\/article><article class='slide-entry flex_column  post-entry post-entry-25256 slide-entry-overview slide-loop-8 slide-parity-even  post-entry-last  av_one_fourth  real-thumbnail posttype-post post-format-standard'  itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/CreativeWork\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/it-security-en\/tips-for-secure-online-gaming\/' data-rel='slide-1' class='slide-image' title='Tips for secure online gaming'><img decoding=\"async\" fetchpriority=\"high\" width=\"260\" height=\"185\" src=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/11\/gaming-260x185.jpg\" class=\"wp-image-25247 avia-img-lazy-loading-not-25247 attachment-portfolio_small size-portfolio_small wp-post-image\" alt=\"secure online gaming\" \/><\/a><div class=\"slide-content\"><header class=\"entry-content-header\" aria-label=\"Slide: Tips for secure online gaming\"><h3 class='slide-entry-title entry-title '  itemprop=\"headline\" ><a href='https:\/\/www.ikarussecurity.com\/en\/security-news-en\/it-security-en\/tips-for-secure-online-gaming\/' title='Tips for secure online gaming'>Tips for secure online gaming<\/a><\/h3><span class=\"av-vertical-delimiter\"><\/span><\/header><div class=\"slide-meta\"><time class='slide-meta-time updated'  itemprop=\"datePublished\" datetime=\"2022-11-23T15:07:28+01:00\" >23. November 2022<\/time><\/div><div class='slide-entry-excerpt entry-content'  itemprop=\"text\" >\n\n\n\n\n\n\n\n<\/div><\/div><footer class=\"entry-footer\"><\/footer><span class='hidden'>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"image\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/ImageObject\" >\n\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/11\/gaming.jpg<\/span>\n\t\t\t\t\t\t<span itemprop='height'>400<\/span>\n\t\t\t\t\t\t<span itemprop='width'>600<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<span class='av-structured-data'  itemprop=\"publisher\" itemtype=\"https:\/\/schema.org\/Organization\" itemscope=\"itemscope\" >\n\t\t\t\t\t\t<span itemprop='name'>IKARUS<\/span>\n\t\t\t\t\t\t<span itemprop='logo' itemscope itemtype='https:\/\/schema.org\/ImageObject'>\n\t\t\t\t\t\t\t<span itemprop='url'>https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2026\/02\/IKARUS-Security-Logo-2.png<\/span>\n\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/span><span class='av-structured-data'  itemprop=\"author\" itemscope=\"itemscope\" itemtype=\"https:\/\/schema.org\/Person\" ><span itemprop='name'>IKARUS<\/span><\/span><span class='av-structured-data'  itemprop=\"datePublished\" datetime=\"2022-08-08T12:48:33+02:00\" >2022-11-23 15:07:28<\/span><span class='av-structured-data'  itemprop=\"dateModified\" itemtype=\"https:\/\/schema.org\/dateModified\" >2025-01-24 10:40:34<\/span><span class='av-structured-data'  itemprop=\"mainEntityOfPage\" itemtype=\"https:\/\/schema.org\/mainEntityOfPage\" ><span itemprop='name'>Tips for secure online gaming<\/span><\/span><\/span><\/article><\/div><\/div><div class='avia-slideshow-arrows avia-slideshow-controls' ><a href='#prev' class='prev-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='left-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Previous\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-9' aria-describedby='av-svg-desc-9' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-9'>Previous<\/title>\n<desc id='av-svg-desc-9'>Previous<\/desc>\n<path d=\"M14.464 27.84q0.832 0.832 0 1.536-0.832 0.832-1.536 0l-12.544-12.608q-0.768-0.768 0-1.6l12.544-12.608q0.704-0.832 1.536 0 0.832 0.704 0 1.536l-11.456 11.904z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Previous<\/span><\/a><a href='#next' class='next-slide  avia-svg-icon avia-font-svg_entypo-fontello' data-av_svg_icon='right-open-big' data-av_iconset='svg_entypo-fontello' tabindex='-1' title=\"Next\"><svg version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"15\" height=\"32\" viewBox=\"0 0 15 32\" preserveAspectRatio=\"xMidYMid meet\" aria-labelledby='av-svg-title-10' aria-describedby='av-svg-desc-10' role=\"graphics-symbol\" aria-hidden=\"true\">\n<title id='av-svg-title-10'>Next<\/title>\n<desc id='av-svg-desc-10'>Next<\/desc>\n<path d=\"M0.416 27.84l11.456-11.84-11.456-11.904q-0.832-0.832 0-1.536 0.832-0.832 1.536 0l12.544 12.608q0.768 0.832 0 1.6l-12.544 12.608q-0.704 0.832-1.536 0-0.832-0.704 0-1.536z\"><\/path>\n<\/svg><span class='avia_hidden_link_text'>Next<\/span><\/a><\/div><\/div>\n<\/div><\/div>\n<\/div><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":4443,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"tags":[],"class_list":["post-23331","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Device Management - IKARUS Security<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Device Management - IKARUS Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/\" \/>\n<meta property=\"og:site_name\" content=\"IKARUS Security\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ikarusantivirussoftware\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-31T15:01:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small-205x300.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@ikarusantivirus\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mobile-management\\\/mobile-device-management\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mobile-management\\\/mobile-device-management\\\/\",\"name\":\"Mobile Device Management - IKARUS Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mobile-management\\\/mobile-device-management\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mobile-management\\\/mobile-device-management\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/homeoffice_pixabay_small-205x300.jpg\",\"datePublished\":\"2022-08-08T10:48:33+00:00\",\"dateModified\":\"2025-03-31T15:01:23+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mobile-management\\\/mobile-device-management\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mobile-management\\\/mobile-device-management\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mobile-management\\\/mobile-device-management\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/homeoffice_pixabay_small-205x300.jpg\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/homeoffice_pixabay_small-205x300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mobile-management\\\/mobile-device-management\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Security Solutions\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"IKARUS mobile.management\",\"item\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/managed-it-ot-security-solutions\\\/ikarus-mobile-management\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Mobile Device Management\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"name\":\"IKARUS Security\",\"description\":\"Sovereign Cybersecurity\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#organization\",\"name\":\"IKARUS Security Software\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.ikarussecurity.com\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/ikarus-logo.png\",\"width\":1805,\"height\":448,\"caption\":\"IKARUS Security Software\"},\"image\":{\"@id\":\"https:\\\/\\\/www.ikarussecurity.com\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ikarusantivirussoftware\",\"https:\\\/\\\/x.com\\\/ikarusantivirus\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/ikarus-security-software-gmbh\",\"https:\\\/\\\/www.xing.com\\\/pages\\\/ikarussecuritysoftwaregmbh\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRRsH3IwUJQqwtBYpNp0Tuw\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Device Management - IKARUS Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Device Management - IKARUS Security","og_url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/","og_site_name":"IKARUS Security","article_publisher":"https:\/\/www.facebook.com\/ikarusantivirussoftware","article_modified_time":"2025-03-31T15:01:23+00:00","og_image":[{"url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small-205x300.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@ikarusantivirus","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/","url":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/","name":"Mobile Device Management - IKARUS Security","isPartOf":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/#primaryimage"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/#primaryimage"},"thumbnailUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small-205x300.jpg","datePublished":"2022-08-08T10:48:33+00:00","dateModified":"2025-03-31T15:01:23+00:00","breadcrumb":{"@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/#primaryimage","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small-205x300.jpg","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2020\/03\/homeoffice_pixabay_small-205x300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/mobile-device-management\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.ikarussecurity.com\/en\/"},{"@type":"ListItem","position":2,"name":"IT Security Solutions","item":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/"},{"@type":"ListItem","position":3,"name":"IKARUS mobile.management","item":"https:\/\/www.ikarussecurity.com\/en\/managed-it-ot-security-solutions\/ikarus-mobile-management\/"},{"@type":"ListItem","position":4,"name":"Mobile Device Management"}]},{"@type":"WebSite","@id":"https:\/\/www.ikarussecurity.com\/en\/#website","url":"https:\/\/www.ikarussecurity.com\/en\/","name":"IKARUS Security","description":"Sovereign Cybersecurity","publisher":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.ikarussecurity.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.ikarussecurity.com\/en\/#organization","name":"IKARUS Security Software","url":"https:\/\/www.ikarussecurity.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","contentUrl":"https:\/\/www.ikarussecurity.com\/wp-content\/uploads\/2022\/06\/ikarus-logo.png","width":1805,"height":448,"caption":"IKARUS Security Software"},"image":{"@id":"https:\/\/www.ikarussecurity.com\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ikarusantivirussoftware","https:\/\/x.com\/ikarusantivirus","https:\/\/www.linkedin.com\/company\/ikarus-security-software-gmbh","https:\/\/www.xing.com\/pages\/ikarussecuritysoftwaregmbh","https:\/\/www.youtube.com\/channel\/UCRRsH3IwUJQqwtBYpNp0Tuw"]}]}},"_links":{"self":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/23331","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/comments?post=23331"}],"version-history":[{"count":30,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/23331\/revisions"}],"predecessor-version":[{"id":40608,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/23331\/revisions\/40608"}],"up":[{"embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/pages\/4443"}],"wp:attachment":[{"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/media?parent=23331"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ikarussecurity.com\/en\/wp-json\/wp\/v2\/tags?post=23331"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}