IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Enterprise Device Security

RSS Feed    Add to Google    Add to My Yahoo!
Enterprise Device Security Reports
Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by
EGUIDE: In this timely E-Guide from we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

A Mobile Application Management Primer for IT
sponsored by
EGUIDE: This E-Guide from explores the benefits of Mobile Application Management (MAM) and how it can help keep your users and their devices and corporate applications and data secure.
Posted: 05 Oct 2012 | Published: 05 Oct 2012

About to Buy Guide: Mobile Device Management Software
sponsored by
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

Mobile Device Security: Emerging Threats, Essential Strategies
sponsored by Juniper Networks, Inc.
WHITE PAPER: In this resource, explore the emerging threats organizations face with the rise of mobile computing. View now to discover key strategies for securing mobile devices, including the essential requirements for an effective solution.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

Mobile Device Management Live Chat
sponsored by
VIRTUAL ENVIRONMENT: In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.
Posted: 14 Jun 2013 | Premiered: 14 Jun 2013

Understanding the risks of mobile apps
sponsored by Veracode, Inc.
WHITE PAPER: Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.
Posted: 11 May 2012 | Published: 11 May 2012

Veracode, Inc.

FAQ Guide on Endpoint Management
sponsored by CenterBeam
EGUIDE: This e-guide from features an FAQ to help you understand the best methods of endpoint management and why cloud-based services should be considered a viable option.
Posted: 24 Jun 2013 | Published: 24 Jun 2013


Survive and Thrive: Tackling Choice, Consumerization and Cloud with BlackBerry Enterprise Server 5.0
sponsored by BlackBerry
PRESENTATION TRANSCRIPT: In this presentation transcript, Sean McManus, RIM Director of Platform Advocacy, discusses the key trends in mobile computing today, and how to stay ahead with BlackBerry Enterprise Portfolio. View now to explore how you can effectively balance choice, security, flexibility and control over your enterprise mobile devices.
Posted: 07 Dec 2011 | Published: 07 Dec 2011


Transcript: Covering the basics in MDM? Why it’s time to advance your strategy
sponsored by BlackBerry
PRESENTATION TRANSCRIPT: Uncover the latest in the world of enterprise mobility as you uncover today's real world problems, traits of the most secure organizations, the future of mobility, and much more!
Posted: 07 Nov 2012 | Published: 07 Nov 2012


The State of Cloud Based Security - Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs
sponsored by Webroot
WHITE PAPER: Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.
Posted: 30 Jan 2012 | Published: 30 Jan 2012

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement