IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Mobile Messaging Security

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Messaging SecurityMultimedia (View All Report Types)
 
Making Simply Better Wireless: Ruckus BeamFlex Explained
sponsored by Ruckus Wireless
WEBCAST: Today's Wi-Fi network is pressured more than ever to handle all types on density - from smart phones, tablets, and other devices, there's a lot that gets in wireless' way.  But what is the true distractor of Wi-Fi?  Wireless itself.
Posted: 09 Oct 2014 | Premiered: Oct 9, 2014

Ruckus Wireless

MDM Decision Time: TechTarget's Must Have Guide to Purchasing Decisions
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Visit SearchSecurity.com's IT Decision Center that focuses on MDM solutions in the marketplace today. Not only can you find the expert's take in this center but you will also have access to answers to the top 5 questions your peers have around MDM solutions directly from the top vendors in the space in one place.
Posted: 26 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Podcast: How Much Cybersecurity is Enough?
sponsored by CDW Corporation
PODCAST: In this podcast, Kathleen Richards, the features editor of Information Security Magazine and searchSecurity.com, seeks to answer a key question: How much cybersecurity is enough?
Posted: 29 Sep 2014 | Premiered: Sep 16, 2014

CDW Corporation

Security Monitoring Lessons Learned from Target, Neiman Marcus, Sony, and Other Recent Security Breaches
sponsored by LogRhythm, Inc.
VIDEO: In this webinar, Randy Franklin Smith, Windows Security Subject Matter Expert, and Erik Ingleby, Product Manager at LogRhythm, discuss the lessons learned from Target, Neiman Marcus, Sony and other security breaches from the perspective of detection.
Posted: 31 Jul 2014 | Premiered: 20 Jun 2014

LogRhythm, Inc.

Mobile Authentication Receives a Modern Twist
sponsored by HID
WEBCAST: This webcast introduces a complete access control solution designed for mobile devices, banishing the need for multiple passwords or security tokens.
Posted: 06 Aug 2014 | Premiered: Aug 6, 2014

HID

The Current State of Identity and Access Management
sponsored by RSA, The Security Division of EMC
VIDEO: This video explains the major shift with Identity and Access Management (IAM) in the past few years.
Posted: 08 Sep 2014 | Premiered: 13 Aug 2014

RSA, The Security Division of EMC

Secure Mobile Printing with UniPrint
sponsored by Citrix Ready and UniPrint
WEBCAST: In today's "Mobile First, Cloud First" environment, as IT professionals, how do you ensure all these highly mobile knowledge-workers print securely? To find the answers, please attend this timely webinar from Citrix and UniPrint.
Posted: 03 Oct 2014 | Premiered: Oct 3, 2014

Citrix Ready and UniPrint

A Case for Pager Replacement Presented by Dr. Larry Ponemon
sponsored by Imprivata
WEBCAST: Discover how communication inefficiencies can severely impact the healthcare industry, and how implementing a new, mobile communication technique can result in cost savings over time.
Posted: 14 Aug 2014 | Premiered: Aug 14, 2014

Imprivata

Self-Service Strategies That Put Service Relationship Management Into Hyperdrive
sponsored by Hewlett-Packard Company
WEBCAST: Take a look at this exclusive webcast to learn more about implementing effective self-service strategies.
Posted: 28 Aug 2014 | Premiered: Aug 28, 2014

Hewlett-Packard Company

It's 2014... Do You Know Where Your Data Is?
sponsored by CipherCloud
WEBCAST: This webcast takes a look at trends in the cloud that are seen across various types of industries, and specifically points out the growing importance of cloud security.
Posted: 25 Sep 2014 | Premiered: Sep 25, 2014

CipherCloud
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement