IT Management  >   Systems Operations  >   Security  >   Security Management  >  

Device Security Policies

RSS Feed    Add to Google    Add to My Yahoo!
Device Security Policies Reports
 
Prevent Fraud and Improve the User Experience with Mobile Access Management
sponsored by IBM
WHITE PAPER: This white paper examines the challenges of providing secure access in the mobile world and explores new security models, policies, and controls that can help to protect your critical assets and data.
Posted: 03 Dec 2014 | Published: 30 Sep 2013

IBM

Managing IT Risk: Trends in Global Information Security
sponsored by Hewlett-Packard Limited
WEBCAST: Tune in to this informative webcast to hear industry veterans explore the top strategies for dealing with cyber threats, meeting compliance, and adapting to the newest developments in the security world, such as mobile device management. Click
Posted: 04 Sep 2014 | Premiered: Jun 30, 2014

Hewlett-Packard Limited

BYOD and Mobile Security: The Disconnect Between Employers and Employees
sponsored by Webroot
WHITE PAPER: This white paper proposes that there is a disconnect between how employees use mobile security and how organizations implement BYOD policies, and presents the results of a recent study commissioned by Webroot that examines these issues.
Posted: 27 Oct 2014 | Published: 31 Jul 2014

Webroot

Nasty Shadow IT Surprises for the Enterprise
sponsored by CipherCloud
RESOURCE: Check out this resource to learn about three shadow IT surprises that are capable of affecting your business.
Posted: 01 Oct 2014 | Published: 08 Sep 2014

CipherCloud

Multifactor Authentication Security School
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this virtual security classroom, Michael Cobb, a renowned security author with over 20 years of experience in the IT industry, surveys the latest authentication methods and technologies coming onto the market.
Posted: 16 Dec 2014 | Premiered: 15 Dec 2014

SearchSecurity.com

Mobility’s Potential for Productivity and Pitfalls
sponsored by CA Technologies.
RESOURCE: In this resource, CA Technologies product marketing leader Arun Bhattacharya discusses the challenges of bringing mobility into the enterprise and how to overcome these obstacles successfully.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

CA Technologies.

Protecting Your Roaming Workforce With Cloud-Based Security
sponsored by Sophos, Inc.
WHITE PAPER: This exclusive resource examines how transitioning to a cloud-based security service can help you meet the challenges met by employees working beyond your organization's secure perimeter.
Posted: 08 Jul 2014 | Published: 16 Dec 2013

Sophos, Inc.

Five Security Considerations in the Mobile Age
sponsored by IBM
WHITE PAPER: This white paper enumerates five security considerations for enterprises in the mobile age and provides a thorough introduction to enterprise mobile applications.
Posted: 07 Oct 2014 | Published: 31 Dec 2012

IBM

Ensuring Compliance in the Asia Pacific Region with SSL Certificates
sponsored by Symantec Corporation
WHITE PAPER: Doing business in Australia, New Zealand, Singapore, or other parts of the Asia Pacific region means one key concern – privacy. This informative resource considers threats to privacy, essential encryption, and SSL certificate best practices.
Posted: 01 Oct 2014 | Published: 01 Oct 2014

Symantec Corporation

Best Practices for a Secure Mobile Workforce
sponsored by Accellion, Inc.
WHITE PAPER: Read this white paper to learn how to reduce the risk of mobile data breaches while keeping mobile workers productive.
Posted: 01 Jul 2014 | Published: 29 Apr 2014

Accellion, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement