{"id":10685,"date":"2016-05-05T05:00:09","date_gmt":"2016-05-05T12:00:09","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=10685"},"modified":"2016-05-04T16:36:23","modified_gmt":"2016-05-04T23:36:23","slug":"protecting-your-organization-against-mobile-threats","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2016\/05\/protecting-your-organization-against-mobile-threats\/","title":{"rendered":"Protecting Your Organization Against Mobile Threats"},"content":{"rendered":"<p>Mobile has been a disruptive force in information technology and it will only continue to grow. The challenge for businesses is that devices must be secured before they can be used within the enterprise setting. Traditional mobile security options are limiting and a more comprehensive approach is needed.\u00a0<!--more--><\/p>\n<p>The good news? We can help you protect the data that\u2019s critical to your organization\u2019s security and success, regardless of user location. With\u00a0Palo Alto Networks <a href=\"https:\/\/www.paloaltonetworks.com\/products\/technologies\/globalprotect.html\" target=\"_blank\">GlobalProtect<\/a>, mobile devices are safely enabled by addressing three critical requirements: managing the device, protecting the device and controlling the data.<\/p>\n<p><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/GlobalProtect.png\"><div style=\"max-width:100%\" data-width=\"500\"><span class=\"ar-custom\" style=\"padding-bottom:23.2%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-large wp-image-12528 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/GlobalProtect-500x116.png\" alt=\"GlobalProtect\" width=\"500\" height=\"116\" srcset=\"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/GlobalProtect-500x116.png 500w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/GlobalProtect-230x54.png 230w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/GlobalProtect-510x119.png 510w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/GlobalProtect-172x40.png 172w, https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2015\/11\/GlobalProtect.png 1134w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/span><\/div><\/a><\/p>\n<p>Download our \u2018<a href=\"http:\/\/connect.paloaltonetworks.com\/revealing-secrets-solution-brief\" target=\"_blank\">Revealing The Secrets: Advances in Android &amp; iOS Attacks<\/a>\u2019 solutions brief to learn more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mobile has been a disruptive force in information technology and it will only continue to grow. The challenge for businesses is that devices must be secured before they can be used within &hellip;<\/p>\n","protected":false},"author":40,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[155,76],"tags":[172,100,592],"coauthors":[716],"class_list":["post-10685","post","type-post","status-publish","format-standard","hentry","category-cybersecurity-2","category-mobility","tag-android","tag-globalprotect","tag-ios"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10685","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/40"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=10685"}],"version-history":[{"count":3,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10685\/revisions"}],"predecessor-version":[{"id":12529,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/10685\/revisions\/12529"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=10685"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=10685"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=10685"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=10685"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}