sponsored by Sybase iAnywhere
Posted:  02 Jan 2007
Published:  01 Nov 2006
Format:  PDF
Length:  12  Page(s)
Type:  White Paper
Language:  English

If security is breached at your company, will you even know? While the risk of a security breach is high, there are many ways for companies to mitigate the risks and provide a safe environment for their critical data while taking into consideration the diverse needs of an increasingly mobile workforce. This white paper, by J.Gold Associates, identifies the 10 critical steps companies must take now to formulate and deploy a successful mobile security strategy.


Jack E. Gold
Founder and Principal Analyst ,  J.Gold Associates.
Jack E. Gold is Founder and Principal Analyst at J.Gold Associates. Mr. Gold has over 35 years in the computer and electronics industries, including work in imaging, multimedia, technical computing, consumer electronics, software development and manufacturing systems. He is a leading authority on mobile, wireless and pervasive computing, advising clients on business analysis, strategic planning, architecture, product evaluation/selection and enterprise application strategies. Before founding J. Gold Associates, he spent 12 years with META Group as a Vice President in Technology Research Services. He also held positions in technical and marketing management at Digital Equipment Corp. and Xerox. Mr. Gold has a BS in Electrical Engineering from Rochester Institute of Technology and an MBA from Clark University.

Handheld Device Security | Handheld Devices | Mobile Device Management | Mobile Device Management Software | Mobile Workers | Security Best Practices | Security Policies | Security Threats | Strategic Planning | Wireless Application Development | Wireless Computing | Wireless Infrastructure | Wireless Messaging Security

View All Resources sponsored by Sybase iAnywhere

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement