Handheld Device Security Reports

Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by TechTarget Security
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

TechTarget Security

Solving the Challenges of BYOD
sponsored by TechTarget Security
WHITE PAPER: This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013

TechTarget Security

PCI Council issues mobile application rules for software developers
sponsored by TechTarget Security
EGUIDE: The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

TechTarget Security

Discover the Risks and Rewards Behind a Mobile Workforce
sponsored by TechTarget Security
EGUIDE: Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

TechTarget Security

Weighing the Risks, Challenges and Benefits Before Diving into BYOD
sponsored by TechTarget Security
EGUIDE: This expert E-Guide aims to help you weigh the pros and cons of the consumer-driven BYOD phenomenon and provides considerations to keep in mind before adoption. View now to learn more!
Posted: 22 Mar 2013 | Published: 22 Mar 2013

TechTarget Security

Considerations and Best Practices for Updating a Corporate BYOD Program
sponsored by TechTarget Security
EGUIDE: In this timely E-Guide from SearchConsumerization.com we detail the best practices and considerations to keep in mind when creating, implementing, and updating a corporate BYOD policy.
Posted: 21 Mar 2013 | Published: 21 Mar 2013

TechTarget Security

Mobile Device Management Technical Guide
sponsored by TechTarget Security
EZINE: In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

TechTarget Security

Weighing the Options for an Enterprise Mobility Strategy
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

TechTarget Security

BYOD Platform Support: Why an iOS/Android Strategy Makes Sense
sponsored by TechTarget Security
EGUIDE: BYOD is running rampant. Do you have a strategy in place to mitigate the risks? This E-Guide from SearchSecurity.com explores why creating an iOS and Android only strategy makes sense and reduces the chance for errors, complexity, and costs.
Posted: 28 Feb 2013 | Published: 28 Feb 2013

TechTarget Security

BYOD Advantages: Save Money, Mobilize Workers, Embrace the Cloud
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores how – with the proper security and management strategies – BYOD can be a win-win for both your employees and your organization. View now to learn more!
Posted: 26 Feb 2013 | Published: 26 Feb 2013

TechTarget Security

BYOD: An Opportunity for IT Evolution
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com details what BYOD and the Millennial generation can bring to your enterprise and explores why aligning business needs with the tools and technologies of BYOD can put your company one step ahead of the competition.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

TechTarget Security

Updating Your Corporate BYOD Program for Success
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores the issues that bring your own device (BYOD) programs solve and key considerations to ensure the success of your BYOD program.
Posted: 07 Dec 2012 | Published: 07 Dec 2012

TechTarget Security

The Cost and Benefits of BYOD
sponsored by TechTarget Security
EGUIDE: Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.
Posted: 06 Dec 2012 | Published: 06 Dec 2012

TechTarget Security

Understanding Consumer Device Management and BYOD
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!
Posted: 28 Nov 2012 | Published: 28 Nov 2012

TechTarget Security

Securing Data, Not Endpoints: The Best Way to Control Consumerization
sponsored by TechTarget Security
EGUIDE: Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

TechTarget Security

MDM Software: Benefits of Mobile Configuration Management
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com explores why configuration management is one of the most important functions of a mobile device management (MDM) policy and describes what you should look for when selecting your MDM solution.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

TechTarget Security

About to Buy Guide: Mobile Device Management Software
sponsored by TechTarget Security
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

TechTarget Security

Mobile Security Software Keeps Corporate Data Safe
sponsored by TechTarget Security
EGUIDE: In this E-Guide from SearchConsumerization.com, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security

Presentation Transcript: BYOD: The Risks of Allowing Personal Mobile Devices On Corporate Networks and How to Mitigate Them
sponsored by TechTarget Security
PRESENTATION TRANSCRIPT: Uncover why MDM and MAM are inefficient at solving the real problem mobile devices present to your network: traffic.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

TechTarget Security

How iOS Encryption and Data Protection Work
sponsored by Symantec Corporation
EGUIDE: This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.
Posted: 15 May 2013 | Published: 15 May 2013

Symantec Corporation

Enterprise Mobility Management Options to Keep Corporate Data Safe
sponsored by MobileIron
EGUIDE: This guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.
Posted: 15 May 2013 | Published: 15 May 2013

MobileIron

BYOD Security Policy, not MDM, at Heart of Smartphone Security
sponsored by Symantec Corporation
EGUIDE: This E-Guide from our experts at SearchSecurity.com teaches you the most effective ways to create BYOD policies and communicate those policies to your employees. Read on and learn how you can build BYOD awareness from the top down.
Posted: 14 May 2013 | Published: 14 May 2013

Symantec Corporation

Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.
sponsored by Insight
WHITE PAPER: Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.
Posted: 13 May 2013 | Published: 13 May 2013

Insight

Choose Your Own Device (CYOD) Workshop
sponsored by Insight
WHITE PAPER: Read on to learn about a CYOD workshop that can help you understand and develop a winning CYOD strategy with help from industry experts. Find out how taking advantage of this valuable learning experience will help you get a good grasp on policies and compliance, device lifecycles, device management, and more.
Posted: 10 May 2013 | Published: 31 Mar 2013

Insight

Achieving a BYOD (Bring-Your-Own-Device) Strategy That Works for You
sponsored by Insight
WHITE PAPER: Read this white paper to learn five key steps that will help you create a successful BYOD management strategy. Read on and learn the best ways to address device policies, security threats, employee awareness, and more.
Posted: 06 May 2013 | Published: 06 May 2013

Insight