IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Mobile Device Security

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Device SecurityMultimedia (View All Report Types)
 
Enterprise Mobility University
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: In this Enterprise Mobility University, we focus on key questions infrastructure managers, systems and virtualization administrators, and IT purchases must consider before introducing BYOD into their environments.
Posted: 25 Sep 2012 | Premiered: 26 Sep 2012


MDM Decision Time: TechTarget's Must Have Guide to Purchasing Decisions
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Visit SearchSecurity.com's IT Decision Center that focuses on MDM solutions in the marketplace today. Not only can you find the expert's take in this center but you will also have access to answers to the top 5 questions your peers have around MDM solutions directly from the top vendors in the space in one place.
Posted: 26 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

MDM Solutions for Dummies: Product Integration
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Question two featured in SearchSecurity.com's IT Decision Center on MDM asks top vendors in the space: Can your product integrate with enterprise infrastructure elements? Find out what these vendors have to say by accessing their answers to this question now.
Posted: 29 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

IBM Tivoli Endpoint Manager: Unified Lifecycle Management for Distributed Endpoints
sponsored by IBM
SOFTWARE DEMO: Explore this menu interface that provides a high-level overview, product demonstration, expert interviews, and resource links for a top vendor's endpoint manager solution. View now to see what unified endpoint management can deliver to your organization.
Posted: 20 Mar 2014 | Premiered: 20 Mar 2014

IBM

Mobile Device Management IT Decision Center: Operating Systems
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: SearchSecurity.com’s expert resource asks: Does your product support any OEM extensions (e.g., Samsung SAFE)? Do you require or offer agent applications installed on managed devices? Find out what top vendors have to say by accessing their answers to these questions now.
Posted: 29 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Tackling Workplace Mobility and Bring Your Own Device Initiatives with the VMware View Mobile Secure Desktop
sponsored by VMware, Inc.
WEBCAST: This webcast explores the issues with enabling BYOD in the workplace and provides details of a desktop virtualization-based solution that will help you securely support device diversity, mobile workers, and BYOD initiatives.
Posted: 25 Oct 2012 | Premiered: Aug 23, 2012

VMware, Inc.

IT, IG and Compliance: The New World Order for Data Management
sponsored by SearchCompliance.com
VIRTUAL TRADESHOW: Join ARMA, SearchCompliance, and hundreds of your peers online for this look at information governance processes in the age of big data. Hear expert opinions on information governance strategies and best practices to keep mobile data secure, stay regulatory compliant and even make data management processes more efficient in the big data era.
Posted: 10 Oct 2013 | Premiered: Oct 13, 2013

SearchCompliance.com

MobilEcho Trial Download
sponsored by Acronis
PRODUCT DEMO: This software demo will help you find out if Acronis mobileEcho is right for your mobile needs.
Posted: 16 Oct 2013 | Premiered: 16 Oct 2013

Acronis

Troubleshooting Enterprise Activation Issues
sponsored by BlackBerry
WEBCAST: This webcast will cover the following topics: Enterprise activation overview, Prerequisites for enterprise activation, Troubleshooting stage 1 issues: activation, Troubleshooting stage 2 issues: verifying encryption etc.
Posted: 07 Jan 2009 | Premiered: Jan 7, 2009

BlackBerry

Dirty Little Secrets: Mobile Apps Invading Your Privacy
sponsored by Veracode, Inc.
WEBCAST: Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement