IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Device Security Policies White Papers (View All Report Types)
 
Six Ways You May Be Losing Mobile Data and Not Even Know It
sponsored by Symantec Corporation
WHITE PAPER: This crucial white paper outlines the 6 ways that your mobile data could be compromised, and why you might not even realize that it's happening until it's too late.
Posted: 29 Aug 2014 | Published: 31 Dec 2013

Symantec Corporation

An Alternative to Today's Distributed Content Security Chaos
sponsored by Box
WHITE PAPER: View this resource to learn how cloud-based services can provide superior security compared to traditional built-out methods.
Posted: 25 Feb 2015 | Published: 05 Mar 2014

Box

How to Prevent the Most Common IAM Failures
sponsored by SailPoint Technologies
WHITE PAPER: In this in-depth resource, discover how management failures can cause unexpected IAM problems.
Posted: 19 Mar 2015 | Published: 08 Oct 2014

SailPoint Technologies

8 Ways to Better Monitor Network Security Threats in the Age of BYOD
sponsored by Hewlett-Packard Company
WHITE PAPER: This helpful white paper takes a look at a number of ways in which security professionals can gain better control of the BYOD explosion and mitigate risk factors before they impact the enterprise.
Posted: 01 Feb 2015 | Published: 14 Jan 2014

Hewlett-Packard Company

Security Empowers Business
sponsored by Blue Coat Systems
WHITE PAPER: In this white paper, discover a way of creating security systems that are a proactive business asset, not a reactive way to slow the business down.
Posted: 07 Apr 2015 | Published: 31 May 2013

Blue Coat Systems

Symantec RSA Survey Report: Expertise, Insider Threats Still Challenging
sponsored by Symantec Corporation
WHITE PAPER: In this RSA survey, learn which IT areas are still a security challenge, and what industry leaders recommend.
Posted: 22 Aug 2014 | Published: 28 Feb 2014

Symantec Corporation

How to Avoid Today's Top 8 Enterprise Mobility Security Issues
sponsored by BlackBerry
WHITE PAPER: This helpful resource presents the top 8 mobile security risks that you need to be on top of right now in order to protect your business, and also provides a questionnaire designed to elucidate and resolve the gaps in your approach to mobile security.
Posted: 22 Apr 2015 | Published: 12 Dec 2014

BlackBerry

What's Missing from Your BYOD Strategy?
sponsored by Citrix
WHITE PAPER: Access this white paper to discover why moving beyond MDM and adopting an enterprise mobility management (EMM) solution is the key to properly handling mobility.
Posted: 21 Apr 2015 | Published: 27 Mar 2015

Citrix

15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER: This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014

SkyHigh

It's Time Businesses Wake up to Mobile Security Reality
sponsored by Threat Track Security
WHITE PAPER: This white paper addresses the need for top-notch mobile security. With the rise of personal devices used in the workplace, security is more important than ever before.
Posted: 06 Jun 2014 | Published: 06 Jun 2014

Threat Track Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement