IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Wireless Data Security

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Data SecurityWhite Papers (View All Report Types)
 
Simply deploy, manage and secure mobile apps from the cloud
sponsored by IBM
WHITE PAPER: View this brief paper that introduces a mobile application management suite that delivers an easy-to-use enterprise app catalog with full security and operational lifecycle management of apps. Learn how this system is ideal for security sensitive data, especially in this BYOD era.
Posted: 08 Sep 2014 | Published: 28 Feb 2013

IBM

Solving the Challenges of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

SearchSecurity.com

The Critical Role of Support in Your Enterprise Mobility Management Strategy
sponsored by BlackBerry
WHITE PAPER: This whitepaper examines the importance of support in EMM strategies and outlines the factors to consider before selecting a support solution to reinforce long term business objectives.
Posted: 12 Aug 2014 | Published: 12 Aug 2014

BlackBerry

How to Meet your Mobile Device Management Challenges
sponsored by IBM
WHITE PAPER: This brief white paper highlights 6 key features of a mobile device management (MDM) system that will help configure devices for enterprise access and secure corporate data on smartphones and tablets – all from a single screen.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

IBM

Security Predictions for 2012
sponsored by Websense, Inc.
WHITE PAPER: With the rise of bring-your-own-devices, mobility, social networking and the cloud, 2012 is likely to bring its share of security challenges. Websense Security Labs researchers compiled a list of security predictions to offer IT pros guidance for on what to expect this upcoming year. View now to uncover the top seven events.
Posted: 23 Nov 2011 | Published: 22 Nov 2011

Websense, Inc.

Achieving a BYOD (Bring-Your-Own-Device) Strategy That Works for You
sponsored by Insight
WHITE PAPER: Read this white paper to learn five key steps that will help you create a successful BYOD management strategy. Read on and learn the best ways to address device policies, security threats, employee awareness, and more.
Posted: 06 May 2013 | Published: 06 May 2013

Insight

Revitalizing Healthcare Delivery with Mobile Communications: Making the Case for BlackBerry Adoption
sponsored by BlackBerry
WHITE PAPER: This paper is the fourth in a four-part series that addresses mobile communications in the healthcare industry. Part Four zeroes in on the features and capabilities that make BlackBerry smartphones an ideal match for healthcare industry requirements.
Posted: 08 Nov 2007 | Published: 08 Nov 2007

BlackBerry

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Mobility & Security: Dazzling Opportunities, Profound Challenges – Carnegie Mellon CyLab
sponsored by McAfee, Inc.
WHITE PAPER: For this report, McAfee teamed up with Carnegie Mellon University to examine the current state of mobile security, some common problems and some recommendations that all businesses and consumers should consider.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

B.Y.O.D Without the Risk
sponsored by Juniper Networks, Inc.
WHITE PAPER: As the Bring Your Own Device phenomenon continues to grow, organizations are faced with the challenge of enabling mobile access while mitigating risk. This resource explores how to transform your network into one that is robust and highly resilient in order to enable mobility, performance, access, security, management, and control that's scalable.
Posted: 06 Jun 2012 | Published: 06 Jun 2012

Juniper Networks, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement