IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Device Security

RSS Feed    Add to Google    Add to My Yahoo!
Device SecurityReports
 
Workplace of the Future: DIY IT
sponsored by Hewlett-Packard Limited
WHITE PAPER: Explore the latest surrounding the trend of consumerization and uncover what your IT department can do to empower users while simultaneously protecting the organization.
Posted: 11 Dec 2012 | Published: 11 Dec 2012

Hewlett-Packard Limited

MDM Decision Time: TechTarget's Must Have Guide to Purchasing Decisions
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Visit SearchSecurity.com's IT Decision Center that focuses on MDM solutions in the marketplace today. Not only can you find the expert's take in this center but you will also have access to answers to the top 5 questions your peers have around MDM solutions directly from the top vendors in the space in one place.
Posted: 26 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Three Key Steps to Achieving Mobile Security Harmony
sponsored by IBM
WHITE PAPER: In order to protect sensitive data, you'll need to take special care to ensure that you are implementing the robust controls needed to prevent both unintentional loss and malicious theft. Read this informative whitepaper in order to learn how to choose and implement data security controls effectively.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

IBM

Decode MDM Solution Features: Must haves for security management
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Question #3 featured in SearchSecurity.com's IT Decision Center on MDM asks top vendors in the space if their products support mobile security management features
Posted: 31 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

Shadow IT in the Enterprise
sponsored by Nasuni Corporation
WHITE PAPER: In this report, discover survey results from more than 1,000 enterprise users to give you a better sense of who is using Dropbox and for what purposes. Don't be surprised to learn that smartphone and tablet users are much more likely to use Dropbox – read on to find out more.
Posted: 06 Aug 2014 | Published: 06 Aug 2014

Nasuni Corporation

How iOS Encryption and Data Protection Work
sponsored by Symantec Corporation
EGUIDE: This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.
Posted: 15 May 2013 | Published: 15 May 2013

Symantec Corporation

Choose Your Own Device (CYOD) Workshop
sponsored by Insight
WHITE PAPER: Read on to learn about a CYOD workshop that can help you understand and develop a winning CYOD strategy with help from industry experts. Find out how taking advantage of this valuable learning experience will help you get a good grasp on policies and compliance, device lifecycles, device management, and more.
Posted: 10 May 2013 | Published: 31 Mar 2013

Insight

Top 10 Mobile Application Risks
sponsored by Veracode, Inc.
WEBCAST: In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.
Posted: 11 May 2012 | Premiered: May 11, 2012

Veracode, Inc.

Top 10 Features of BlackBerry Enterprise Service 10
sponsored by BlackBerry
WHITE PAPER: IT leaders need a solution that can help them manage multiple platforms, mixed ownership and higher usage. Why do so many CIOs turn to BlackBerry Enterprise Service 10 for help overseeing their mobility management needs? Find out in this white paper.
Posted: 29 Jun 2013 | Published: 29 Jun 2013

BlackBerry

User-Based Licensing for Endpoint Protection and BYOD
sponsored by Webroot
WHITE PAPER: User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013

Webroot
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement