IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Mobile Security

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Security White Papers (View All Report Types)
 
Addressing Mobile Threats: Effective Detection and Response
sponsored by ArcSight, an HP Company
WHITE PAPER: Mobile threats can take on many forms including malware, distributed denial of service attacks (DDoS), and fraud. While these attacks aren't new, their ability to leverage mobile devices is. This paper focuses on a few of the most problematic mobile threats and provides tips and hints for how to handle them. Read on to learn more.
Posted: 19 Oct 2009 | Published: 07 Mar 2007

ArcSight, an HP Company

Security in the Age of Mobility
sponsored by Trend Micro
WHITE PAPER: This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012

Trend Micro

Getting the Most from Your Wireless Network
sponsored by WildPackets, Inc.
WHITE PAPER: Network disruptions have become business disruptions with financial and sometimes even legal consequences. This white paper outlines best practices in monitoring, analyzing, and troubleshooting wireless networks using WildPackets OmniPee.
Posted: 26 Aug 2008 | Published: 26 Aug 2008

WildPackets, Inc.

How Advanced is Your Enterprise’s iPhone, BlackBerry and Android Management?
sponsored by BoxTone
WHITE PAPER: With an explosion of iPhone, BlackBerry & Android devices entering your workplace, how advanced is your team’s ability to secure, manage and support them? Read this Aberdeen report to learn how the best-in-class are benefiting from leveraging mobility management.
Posted: 01 Sep 2010 | Published: 01 Sep 2010

BoxTone

Cyber Threats to Online Shopping Cheer
sponsored by Neustar
WHITE PAPER: Learn how to protect your brand and stay online during high-volume occasions. See statistics on current online shopping trends and discover how to stop fraudulent actors before they can damage your organization.
Posted: 03 Oct 2016 | Published: 31 Dec 2016

Neustar

Building Secure Wireless LANs
sponsored by Aerohive Networks
WHITE PAPER: This white paper provides a holistic view of Wi-Fi security, offering guidelines to deploy a wireless network that’s as secure as your wired one.  
Posted: 01 Jun 2011 | Published: 31 May 2011

Aerohive Networks

Security Best Practices for the Mobile Enterprise
sponsored by Juniper Networks, Inc.
WHITE PAPER: The growing amount of mobile devices in the workplace is having a profound impact on your network security. Take the right measures to ensure security through mobile device management and centralized network access control to mitigate security risks.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

Can Your Security Keep Up with 70,000 New Malware Strains a Day?
sponsored by CenturyLink Technology Solutions
WHITE PAPER: This timely white paper takes a look at some of the year's top security trends as well as sound advice for managing the risk associated with the emerging threats brought about by the proliferation of consumer mobile devices within the enterprise.
Posted: 18 Apr 2012 | Published: 18 Apr 2012

CenturyLink Technology Solutions

NHS Trust Enhances Healthcare with Juniper Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: The Belfast H&SC Trust had recognized the benefits of wireless technology, but the existing network was proving increasingly difficult to manage. A Juniper Networks Wireless LAN Portfolio pilot was deployed, proving to be a success in terms of its stability, security and manageability allowing centralized management at the touch of a button.
Posted: 20 May 2011 | Published: 20 May 2011

Juniper Networks, Inc.

Dispelling Top Ten Wireless Security Myths
sponsored by AirTight Networks, Inc.
WHITE PAPER: Myths about wireless security can be both dangerous and costly, this paper will revisit and debunk top ten wireless security myths.
Posted: 16 May 2008 | Published: 01 May 2008

AirTight Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement