IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

PDA Security

RSS Feed    Add to Google    Add to My Yahoo!
PDA Security White Papers (View All Report Types)
 
Timely Topics: Enterprise BYOD
sponsored by Workforce
WHITE PAPER: This informative paper helps outline some ways to control the risks of BYOD and addresses other factors that influence your decision to establish a BYOD policy. Discover the compelling advantages of BYOD that will have your leaders deciding "when," not "if," to implement this mobile strategy.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Workforce

Compliance and Mobile Computing
sponsored by Intermec
WHITE PAPER: The regulations listed above were designed to protect customers and the companies that serve them, furthermore, compliance is required for doing business in today's litigious environment.
Posted: 18 Dec 2005 | Published: 01 Dec 2005

Intermec

Strategy for Securing Mobile Content - 5 Key Guidelines
sponsored by Accellion, Inc.
WHITE PAPER: Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

Accellion, Inc.

Downloading Mobile Apps is Risky Business
sponsored by McAfee, Inc.
WHITE PAPER: Learn how downloading mobile apps could introduce client-side vulnerabilities.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

The ClearPass Access Management System
sponsored by Aruba Networks
WHITE PAPER: This whitepaper describes a way that you can take back control of your company network without having to string together a multitude of loosely integrated point-products that only lead to more complexity. Read on and learn how you can manage all things BYOD from one place.
Posted: 22 May 2013 | Published: 22 May 2013

Aruba Networks

Androids in the Enterprise
sponsored by McAfee, Inc.
WHITE PAPER: McAfee is expanding its support for Android use, and keeping pace with the maturation of enterprise features in the underlying platform, such as remote management, encryption, and other crucial minimum requirements.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

User-Based Licensing for Endpoint Protection and BYOD
sponsored by Webroot
WHITE PAPER: User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Webroot

The State of Cloud Based Security - Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs
sponsored by Webroot
WHITE PAPER: Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.
Posted: 30 Jan 2012 | Published: 30 Jan 2012

Webroot

Why now is the Time to Get Started with BlackBerry Enterprise Service 10
sponsored by BlackBerry
WHITE PAPER: To prepare for the new BlackBerry, many IT managers are turning to BlackBerry Enterprise Service 10 to provide unified device management for BlackBerry OS, BlackBerry 10, iOS and Android devices. Get tips on mobile management and transitioning to BlackBerry Services, and learn how you can try the platform for free.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

BlackBerry

Honey Stick Report Results
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Smartphone Honey Stick Project is an experiment involving 50 “lost” smartphones, demonstrating what users should expect to happen to their smartphones if they are lost and then found by a stranger. View now to explore key findings and uncover recommendations for protecting mobile devices and sensitive information.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement