IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Mobile Device Security

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Device SecurityWhite Papers (View All Report Types)
 
Solving the Challenges of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

SearchSecurity.com

Wireless Handheld Devices Become Trusted Network Devices
sponsored by Intel Corporation
WHITE PAPER: Read this white paper that details a new solution that allows employees to use their handheld device as a trusted device on the corporate network.
Posted: 31 Aug 2007 | Published: 01 Jan 2006

Intel Corporation

Compliance and Mobile Computing
sponsored by Intermec
WHITE PAPER: The regulations listed above were designed to protect customers and the companies that serve them, furthermore, compliance is required for doing business in today's litigious environment.
Posted: 18 Dec 2005 | Published: 01 Dec 2005

Intermec

CRM for the Professional on the Go
sponsored by BlackBerry
WHITE PAPER: Mobile CRM is something that needs to be considered now. As a business leader, you might have put it into your mental to do later box, but the reasons to make it a priority are compelling. Read this paper to discover why.
Posted: 01 Sep 2008 | Published: 25 Dec 2006

BlackBerry

Strategy for Securing Mobile Content - 5 Key Guidelines
sponsored by Accellion, Inc.
WHITE PAPER: Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

Accellion, Inc.

Preventing Data Leaks on USB Ports
sponsored by Pointsec Mobile Technologies
WHITE PAPER: This paper examines how to effectively prevent data leakage and protect vital company information stored on your USB devices. You will also learn how to ease your company's data movement and secure important information with USB storage techniques.
Posted: 31 Jan 2007 | Published: 01 Jan 2007

Pointsec Mobile Technologies

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them
sponsored by GroupLogic
WHITE PAPER: Although mobile computing can offer a number of opportunities to drive substantial value to the enterprise, it does not come without risk. View this paper to discover the top 5 security threats to the mobile enterprise and solutions on how to avoid them while fostering happy employees, productivity and streamlined workflows.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

GroupLogic

Androids in the Enterprise
sponsored by McAfee, Inc.
WHITE PAPER: McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

Mobile Device Security: Emerging Threats, Essential Strategies
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this resource, explore the emerging threats organizations face with the rise of mobile computing. View now to discover key strategies for securing mobile devices, including the essential requirements for an effective solution.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement