IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Wireless Data Security

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Data SecurityWhite Papers (View All Report Types)
 
Mobile Device Management: Fundamental steps for success
sponsored by SearchSecurity.com
WHITE PAPER: This expert e-guide from SearchConsumerization.com will highlight a number of ways IT can prepare for the influx of mobile devices into the workplace and lay the foundation needed to successfully support mobility. Learn about setting up your network structure for mobility, fundamental features for success when choosing an MDM system, and more.
Posted: 29 May 2013 | Published: 29 May 2013

SearchSecurity.com

Back Up Mission-Critical Data Whenever and Wherever
sponsored by Code42
WHITE PAPER: This in-depth resource shines light on a continuous, multi-destination system to back up mission-critical data whenever and wherever it is created.
Posted: 21 Apr 2014 | Published: 21 Apr 2014

Code42

Tapping into the Bring Your Own Device Shift
sponsored by Workforce Software
WHITE PAPER: This white paper explores the BYOD trend, examines its intersections with workforce management, and provides recommendations on how you can maximize your workforce management ROI in an increasingly mobile environment.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Workforce Software

Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix
WHITE PAPER: Read on to find an executive checklist that will help you ensure that you are ready to handle both enterprise mobility and bring-your-own-device programs.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Citrix

Solving the Challenges of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

SearchSecurity.com

Top 5 IT Considerations for Secure Wireless Email
sponsored by Sybase iAnywhere
WHITE PAPER: The use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.
Posted: 06 Jun 2007 | Published: 01 Jan 2006

Sybase iAnywhere

State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER: Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011

Veracode, Inc.

12 Security Predictions for 2012
sponsored by Trend Micro India Pvt. Ltd.
WHITE PAPER: In this resource, the team at Trend Micro came up with 12 security predictions for this year that fall under main categories including big IT trends, mobile landscape, threat landscape, and Data leaks and breaches. View now to explore these predictions to help you better prepare and protect against upcoming threats.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

Trend Micro India Pvt. Ltd.

Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
sponsored by Dell, Inc.
WHITE PAPER: Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
Posted: 12 Jun 2013 | Published: 30 Nov 2012

Dell, Inc.

Understanding the risks of mobile apps
sponsored by Veracode, Inc.
WHITE PAPER: Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.
Posted: 11 May 2012 | Published: 11 May 2012

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement