IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Enterprise Device Security

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Device Security White Papers (View All Report Types)
 
Increasing the ROI of Mobility
sponsored by Sybase, an SAP company
WHITE PAPER: Read this paper to learn that virtually every organization with a mobile workforce can benefit from Afaria. This powerful and proven technology that is capable of handling large data transfers to and from mobile devices is already delivering notable business benefits to many organizations.
Posted: 08 May 2009 | Published: 08 May 2009

Sybase, an SAP company

Ensuring The Availability of Blackberry Enterprise Server
sponsored by Double-Take Software
WHITE PAPER: In order to implement a plan for protecting and backing up BlackBerry handhelds, it's important to understand how the Blackberry Enterprise Server solution works within an existing email environment. This paper gives a quick lessong to that end, then concentrates on ensuring the availability of the Blackberry Enterprise Server
Posted: 16 Nov 2009 | Published: 16 Oct 2009

Double-Take Software

Top 5 IT Considerations for Secure Wireless Email
sponsored by Sybase iAnywhere
WHITE PAPER: The use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.
Posted: 06 Jun 2007 | Published: 01 Jan 2006

Sybase iAnywhere

The ClearPass Access Management System
sponsored by Aruba Networks
WHITE PAPER: This whitepaper describes a way that you can take back control of your company network without having to string together a multitude of loosely integrated point-products that only lead to more complexity. Read on and learn how you can manage all things BYOD from one place.
Posted: 22 May 2013 | Published: 22 May 2013

Aruba Networks

Choose Your Own Device (CYOD) Workshop
sponsored by Insight
WHITE PAPER: Read on to learn about a CYOD workshop that can help you understand and develop a winning CYOD strategy with help from industry experts. Find out how taking advantage of this valuable learning experience will help you get a good grasp on policies and compliance, device lifecycles, device management, and more.
Posted: 10 May 2013 | Published: 31 Mar 2013

Insight

Securely Mobilize Lotus Domino: E-mail, Instant Message and Custom Lotus Applications
sponsored by Sybase iAnywhere
WHITE PAPER: Mobile applications that support the enterprise must be reliable, secure and available. Download today and discover how to work efficiently and effectively from your mobile device with real-time access to business critical Lotus Notes information.
Posted: 06 Jun 2007 | Published: 01 Jun 2007

Sybase iAnywhere

Downloading Mobile Apps is Risky Business
sponsored by Intel Security
WHITE PAPER: Learn how downloading mobile apps could introduce client-side vulnerabilities.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Intel Security

Best Practices for BlackBerry Administrators
sponsored by BlackBerry
WHITE PAPER: This whitepaper discusses best practices for managing your BlackBerry Enterprise Server running on Lotus Domino. Take a tour of the administrative features and tools that can make your job easier. This session is a must for any BlackBerry administrator.
Posted: 18 Aug 2008 | Published: 18 Aug 2008

BlackBerry

Citrix Mobile Solutions Bundle - Product Overview
sponsored by Citrix Systems, Inc.
WHITE PAPER: Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.
Posted: 14 Jun 2013 | Published: 06 Jun 2013

Citrix Systems, Inc.

Understanding the risks of mobile apps
sponsored by Veracode, Inc.
WHITE PAPER: Many of the risks of moble devicesĀ are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.
Posted: 11 May 2012 | Published: 11 May 2012

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement