10 Steps to Mobile Security

10 Steps to Mobile Security


If security is breached at your company, will you even know? While the risk of a security breach is high, there are many ways for companies to mitigate the risks and provide a safe environment for their critical data while taking into consideration the diverse needs of an increasingly mobile workforce. This white paper, by J.Gold Associates, identifies the 10 critical steps companies must take now to formulate and deploy a successful mobile security strategy.


Jack E. Gold Founder and Principal Analyst, J.Gold Associates. Jack E. Gold is Founder and Principal Analyst at J.Gold Associates. Mr. Gold has over 35 years in the computer and electronics industries, including work in imaging, multimedia, technical computing, consumer electronics, software development and manufacturing systems. He is a leading authority on mobile, wireless and pervasive computing, advising clients on business analysis, strategic planning, architecture, product evaluation/selection and enterprise application strategies. Before founding J. Gold Associates, he spent 12 years with META Group as a Vice President in Technology Research Services. He also held positions in technical and marketing management at Digital Equipment Corp. and Xerox. Mr. Gold has a BS in Electrical Engineering from Rochester Institute of Technology and an MBA from Clark University.
Sybase iAnywhere
02 Jan 2007
01 Nov 2006
12 Page(s)
White Paper
Already a Bitpipe member? Login here

Download this White Paper!

By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.

You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.

Safe Harbor