IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Device Security

RSS Feed    Add to Google    Add to My Yahoo!
Device Security Reports
 
E-Guide: Identifying and addressing evolving threats
sponsored by SearchSecurity.com
EGUIDE: This expert resource offers key insight into the true definition of cyberthreats and uncovers 4 essential steps to consider when developing your IT security strategy for 2012.
Posted: 03 Feb 2012 | Published: 03 Feb 2012

SearchSecurity.com

Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Enterprise Mobility University: Taking Control of BYOD with MDM Classroom
sponsored by SearchMobileComputing
VIRTUAL ENVIRONMENT: Enterprise MDM systems help admins monitor and secure consumer devices, but it can be tricky to keep track of all the different technologies and strategies available.
Posted: 25 Mar 2013 | Premiered: 25 Mar 2013

SearchMobileComputing

Android security settings and controls for Android enterprise security
sponsored by SearchSecurity.com
EGUIDE: With all the security gaps in the Android platform, is it possible to achieve enterprise-level security? In this resource, gain expert insight into enabling effective Android enterprise security. View now to explore Android security settings and control, battling Android malware, and much more.
Posted: 01 Feb 2012 | Published: 01 Feb 2012

SearchSecurity.com

The Cost and Benefits of BYOD
sponsored by SearchSecurity.com
EGUIDE: Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.
Posted: 06 Dec 2012 | Published: 06 Dec 2012

SearchSecurity.com

Solving the Challenges of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

SearchSecurity.com

Securing Data, Not Endpoints: The Best Way to Control Consumerization
sponsored by SearchSecurity.com
EGUIDE: Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

SearchSecurity.com

12 Security Predictions for 2012
sponsored by Trend Micro India Pvt. Ltd.
WHITE PAPER: In this resource, the team at Trend Micro came up with 12 security predictions for this year that fall under main categories including big IT trends, mobile landscape, threat landscape, and Data leaks and breaches. View now to explore these predictions to help you better prepare and protect against upcoming threats.
Posted: 20 Feb 2012 | Published: 20 Feb 2012

Trend Micro India Pvt. Ltd.

Enterprise Mobility Management Options to Keep Corporate Data Safe
sponsored by MobileIron
EGUIDE: This guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.
Posted: 15 May 2013 | Published: 15 May 2013

MobileIron

Mobile Device Management Live Chat
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.
Posted: 14 Jun 2013 | Premiered: 14 Jun 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement