IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Wireless Data Security

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Data Security White Papers (View All Report Types)
Bring Your Own Device (BYOD) Unleashed in the Age of IT Consumerization
sponsored by Bradford Networks
WHITE PAPER: With the proliferation of mobile devices and the consumerization of IT, corporate networks are becoming more challenging to manage and more at-risk every day. In this paper, explore this increasing issue, and how IT departments can implement a practical and secure strategy and offer the convenience and business agility that mobile devices provide.
Posted: 15 Dec 2011 | Published: 15 Dec 2011

Bradford Networks

Endpoint Protection Solutions: Why the Traditional Model is Broken
sponsored by Webroot
WHITE PAPER: Securing the enterprise may never have been a simple task, but now it is far more complex as hackers have become more creative and as the enterprise itself has extended into remote locations and as far as “the cloud.”
Posted: 10 Nov 2011 | Published: 10 Nov 2011


Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.
sponsored by Insight
WHITE PAPER: Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.
Posted: 13 May 2013 | Published: 13 May 2013


Downloading Mobile Apps is Risky Business
sponsored by Intel Security
WHITE PAPER: Learn how downloading mobile apps could introduce client-side vulnerabilities.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Intel Security

Mobility is moving fast. To stay in control, you have to prepare for change
sponsored by IBM
WHITE PAPER: The practice of BYOD is on the rise and organizations cannot sit back and let employees roam the network with unsupervised devices. It’s time to take action and tackle the common issues and consequences of BYOD. In this paper, uncover seven (7) questions BYOD raises and how you can address them.
Posted: 25 Apr 2012 | Published: 25 Apr 2012


Ensuring The Availability of Blackberry Enterprise Server
sponsored by Double-Take Software
WHITE PAPER: In order to implement a plan for protecting and backing up BlackBerry handhelds, it's important to understand how the Blackberry Enterprise Server solution works within an existing email environment. This paper gives a quick lessong to that end, then concentrates on ensuring the availability of the Blackberry Enterprise Server
Posted: 16 Nov 2009 | Published: 16 Oct 2009

Double-Take Software

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.

Why now is the Time to Get Started with BlackBerry Enterprise Service 10
sponsored by BlackBerry
WHITE PAPER: To prepare for the new BlackBerry, many IT managers are turning to BlackBerry Enterprise Service 10 to provide unified device management for BlackBerry OS, BlackBerry 10, iOS and Android devices. Get tips on mobile management and transitioning to BlackBerry Services, and learn how you can try the platform for free.
Posted: 29 Jun 2013 | Published: 29 Jun 2013


Top 5 IT Considerations for Secure Wireless Email
sponsored by Sybase iAnywhere
WHITE PAPER: The use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.
Posted: 06 Jun 2007 | Published: 01 Jan 2006

Sybase iAnywhere

Understanding the risks of mobile apps
sponsored by Veracode, Inc.
WHITE PAPER: Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.
Posted: 11 May 2012 | Published: 11 May 2012

Veracode, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement