IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Device Security

RSS Feed    Add to Google    Add to My Yahoo!
Device Security White Papers (View All Report Types)
 
The State of Cloud Based Security - Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs
sponsored by Webroot
WHITE PAPER: Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.
Posted: 30 Jan 2012 | Published: 30 Jan 2012

Webroot

Mobile Device Security: Emerging Threats, Essential Strategies
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this resource, explore the emerging threats organizations face with the rise of mobile computing. View now to discover key strategies for securing mobile devices, including the essential requirements for an effective solution.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

Protection for Every Enterprise: How BlackBerry 10 Security Works
sponsored by BlackBerry
WHITE PAPER: If you're choosing a platform for enterprise-grade mobile device management, security probably tops your list of requirements. Learn how BlackBerry Enterprise Service 10 can help you secure and manage not only BlackBerry devices, but iOS and Android devices as well, enabling the cross-platform mobility management you need.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

BlackBerry

BlackBerry Wireless Enterprise Activation
sponsored by BlackBerry
WHITE PAPER: This document describes how administrators can enable wireless enterprise activation for users on the BlackBerry Enterprise Server™, and how users can initiate wireless enterprise activation from their handhelds.
Posted: 11 Aug 2006 | Published: 01 Jan 2004

BlackBerry

B.Y.O.D Without the Risk
sponsored by Juniper Networks, Inc.
WHITE PAPER: As the Bring Your Own Device phenomenon continues to grow, organizations are faced with the challenge of enabling mobile access while mitigating risk. This resource explores how to transform your network into one that is robust and highly resilient in order to enable mobility, performance, access, security, management, and control that's scalable.
Posted: 06 Jun 2012 | Published: 06 Jun 2012

Juniper Networks, Inc.

Hedge Funds: Overcoming Obstacles to Wireless Productivity
sponsored by BlackBerry
WHITE PAPER: Making wireless solutions a priority for your business will greatly benefit the performance of your network and the critical data living on it. Read this white paper to learn more.
Posted: 04 May 2007 | Published: 01 Jan 2007

BlackBerry

Top 5 IT Considerations for Secure Wireless Email
sponsored by Sybase iAnywhere
WHITE PAPER: The use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.
Posted: 06 Jun 2007 | Published: 01 Jan 2006

Sybase iAnywhere

Honey Stick Report Results
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Smartphone Honey Stick Project is an experiment involving 50 “lost” smartphones, demonstrating what users should expect to happen to their smartphones if they are lost and then found by a stranger. View now to explore key findings and uncover recommendations for protecting mobile devices and sensitive information.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

Symantec Corporation

Malicious Mobile Threats Report, 2010-2011
sponsored by Juniper Networks, Inc.
WHITE PAPER: Threats to mobile devices are real, and lacking proper oversight and awareness can lead to serious consequences. In this report explore new and emerging mobile threats and attack vectors, as well as gain practical threat mitigation techniques.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

Wireless Handheld Devices Become Trusted Network Devices
sponsored by Intel Corporation
WHITE PAPER: Read this white paper that details a new solution that allows employees to use their handheld device as a trusted device on the corporate network.
Posted: 31 Aug 2007 | Published: 01 Jan 2006

Intel Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement