IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

PDA Security

RSS Feed    Add to Google    Add to My Yahoo!
PDA Security White Papers (View All Report Types)
 
Solving the Challenges of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

SearchSecurity.com

Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
sponsored by DellEMC and Intel®
WHITE PAPER: Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
Posted: 12 Jun 2013 | Published: 30 Nov 2012

DellEMC and Intel®

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them
sponsored by GroupLogic
WHITE PAPER: Although mobile computing can offer a number of opportunities to drive substantial value to the enterprise, it does not come without risk. View this paper to discover the top 5 security threats to the mobile enterprise and solutions on how to avoid them while fostering happy employees, productivity and streamlined workflows.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

GroupLogic

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Picking a Sensible Mobile Password Policy
sponsored by Perimeter eSecurity
WHITE PAPER: This paper recommends a passcode policy for mobile devices that is reasonable, user-friendly, highly usable, but still strong enough to protect your company’s data.
Posted: 03 Nov 2011 | Published: 03 Nov 2011

Perimeter eSecurity

Citrix Mobile Solutions Bundle - Product Overview
sponsored by Citrix Systems, Inc.
WHITE PAPER: Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.
Posted: 14 Jun 2013 | Published: 06 Jun 2013

Citrix Systems, Inc.

Bring Your Own iPad to Work
sponsored by Aruba Networks, Inc.
WHITE PAPER: Many CIOs face overwhelming user demand to support personal mobile devices on the WLAN. This paper reviews the issues IT organizations face when employees demand to use their personal mobile devices in the office.
Posted: 10 Mar 2011 | Published: 10 Mar 2011

Aruba Networks, Inc.

Increasing the ROI of Mobility
sponsored by Sybase, an SAP company
WHITE PAPER: Read this paper to learn that virtually every organization with a mobile workforce can benefit from Afaria. This powerful and proven technology that is capable of handling large data transfers to and from mobile devices is already delivering notable business benefits to many organizations.
Posted: 08 May 2009 | Published: 08 May 2009

Sybase, an SAP company

Endpoint Protection Solutions: Why the Traditional Model is Broken
sponsored by Webroot
WHITE PAPER: Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”
Posted: 10 Nov 2011 | Published: 10 Nov 2011

Webroot

Top 10 Features of BlackBerry Enterprise Service 10
sponsored by BlackBerry
WHITE PAPER: IT leaders need a solution that can help them manage multiple platforms, mixed ownership and higher usage. Why do so many CIOs turn to BlackBerry Enterprise Service 10 for help overseeing their mobility management needs? Find out in this white paper.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

BlackBerry
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement