IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Mobile Security

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Security White Papers (View All Report Types)
 
Definitive eGuide: Mobility and IoT Causing IT headaches? Connect and Protect with Adaptive Trust
sponsored by Aruba Networks
WHITE PAPER: This white paper outlines the pre-planning and deployment steps needed to help guide you on your journey of enterprise BYOD and IoT. Learn how greater visibility and the integration of your policy decision engine with third-party security solutions can enhance your ability to offer end-to-end mobile protection.
Posted: 22 Mar 2016 | Published: 01 Feb 2016

Aruba Networks

Mobility and the New Face of Security Threats
sponsored by Aruba Networks
WHITE PAPER: In this white paper, you will examine the new face of security threats against today's enterprise mobility struggles. Read on to bolster your network by tying together granular contextual information from devices to policy engine and traffic protection.
Posted: 16 Feb 2016 | Published: 16 Feb 2016

Aruba Networks

Addressing Mobile Threats: Effective Detection and Response
sponsored by ArcSight, an HP Company
WHITE PAPER: Mobile threats can take on many forms including malware, distributed denial of service attacks (DDoS), and fraud. While these attacks aren't new, their ability to leverage mobile devices is. This paper focuses on a few of the most problematic mobile threats and provides tips and hints for how to handle them. Read on to learn more.
Posted: 19 Oct 2009 | Published: 07 Mar 2007

ArcSight, an HP Company

Hyper-Mobility meets Security in the corporate environment
sponsored by Kaspersky Lab
WHITE PAPER: The use of mobile devices in the enterprise is on the rise as it enables employees to be more productive. But this new trend does not come without risk. View this paper now to explore the key threats of mobile device usage and discover how to ensure complete protection with Kaspersky Endpoint Security for Smartphone.
Posted: 04 Nov 2011 | Published: 04 Nov 2011

Kaspersky Lab

Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure
sponsored by Intel Security
WHITE PAPER: This paper defines and identifies three steps an organization should pursue in parallel to bring mobile devices into your security infrastructure.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Intel Security

A Business-Driven Approach to Mobile Enterprise Security
sponsored by Juniper Networks, Inc.
WHITE PAPER: Prepare your organization for the consumerization of IT and BYOD with the help of this resource. Uncover details about mobile enterprise policy creation, security monitoring, network and security infrastructure, and more.
Posted: 11 May 2012 | Published: 11 May 2012

Juniper Networks, Inc.

User-Based Licensing for Endpoint Protection and BYOD
sponsored by Webroot
WHITE PAPER: User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Webroot

The Ultralight Branch
sponsored by Aerohive Networks
WHITE PAPER: Access this whitepaper to learn more about enterprise connections and how ultralight branches can help keep users connected from multiple, small locations.
Posted: 08 Dec 2011 | Published: 08 Dec 2011

Aerohive Networks

5 Steps to Secure the Wireless Network
sponsored by NETGEAR Inc.
WHITE PAPER: Today’s organizations increasingly rely on the ease and lower cost of wireless networking. Schools and businesses are investing in Wi-Fi to leverage benefits including more flexible network connectivity, improved productivity, and reduced capital expense. Read this white paper to learn how to incorporate wireless connectivity into your everyday.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

NETGEAR Inc.

Employee-owned Smartphones: Seize the Opportunity
sponsored by BlackBerry
WHITE PAPER: With the increasing demand for employees to use personal smartphones for work-related duties, IT management must take a leadership role in setting up mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources. Continue reading to learn more.
Posted: 27 Jul 2010 | Published: 27 Jul 2010

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement