IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Wireless Handheld Device Security

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Handheld Device Security White Papers (View All Report Types)
 
Information Security Essential Guide: Strategies for Tackling BYOD
sponsored by SearchSecurity.com
WHITE PAPER: Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.
Posted: 31 May 2013 | Published: 31 May 2013

SearchSecurity.com

Solving the Challenges of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

SearchSecurity.com

Best Practices for Managing Your BlackBerry Environment
sponsored by BlackBerry
WHITE PAPER: This reference document will provide you with detailed information on how to effectively manage your BlackBerry Enterprise Server architecture.
Posted: 18 Mar 2009 | Published: 18 Mar 2009

BlackBerry

Revitalizing Healthcare Delivery with Mobile Communications: Making the Case for BlackBerry Adoption
sponsored by BlackBerry
WHITE PAPER: This paper is the fourth in a four-part series that addresses mobile communications in the healthcare industry. Part Four zeroes in on the features and capabilities that make BlackBerry smartphones an ideal match for healthcare industry requirements.
Posted: 08 Nov 2007 | Published: 08 Nov 2007

BlackBerry

Keep Your Enemies Close: Three Steps to Bring Mobile Devices into Your Security Infrastructure
sponsored by Intel Security
WHITE PAPER: This paper defines and identifies three steps an organization should pursue in parallel to bring mobile devices into your security infrastructure.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Intel Security

BlackBerry Wireless Enterprise Activation
sponsored by BlackBerry
WHITE PAPER: This document describes how administrators can enable wireless enterprise activation for users on the BlackBerry Enterprise Server™, and how users can initiate wireless enterprise activation from their handhelds.
Posted: 11 Aug 2006 | Published: 01 Jan 2004

BlackBerry

Picking a Sensible Mobile Password Policy
sponsored by Perimeter eSecurity
WHITE PAPER: This paper recommends a passcode policy for mobile devices that is reasonable, user-friendly, highly usable, but still strong enough to protect your company’s data.
Posted: 03 Nov 2011 | Published: 03 Nov 2011

Perimeter eSecurity

Say “Yes” to Mobile Devices
sponsored by Intel Security
WHITE PAPER: Learn how the McAfee Enterprise Mobility Management (McAfee EMM) web services platform addresses the nuances of mobile device technology while helping IT control these devices the way they control other endpoints.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Intel Security

Honey Stick Report Results
sponsored by Symantec Corporation
WHITE PAPER: The Symantec Smartphone Honey Stick Project is an experiment involving 50 “lost” smartphones, demonstrating what users should expect to happen to their smartphones if they are lost and then found by a stranger. View now to explore key findings and uncover recommendations for protecting mobile devices and sensitive information.
Posted: 09 Apr 2012 | Published: 09 Apr 2012

Symantec Corporation

12 Security Predictions for 2012
sponsored by Trend Micro India Pvt. Ltd.
WHITE PAPER: In this resource, the team at Trend Micro came up with 12 security predictions for this year that fall under main categories including big IT trends, mobile landscape, threat landscape, and Data leaks and breaches. View now to explore these predictions to help you better prepare and protect against upcoming threats.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

Trend Micro India Pvt. Ltd.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement