IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Mobile Device Security

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Device Security Reports
 
E-Guide: Physical Security Awareness and Smartphone Security Policy
sponsored by SearchSecurity.com
EGUIDE: In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.
Posted: 13 Feb 2012 | Published: 13 Feb 2012

SearchSecurity.com

October Essentials Guide on Mobile Device Security
sponsored by SearchSecurity.com
ESSENTIAL GUIDE: The October issue of Information Security offers advice on controlling the onslaught of employee-owned devices in your workplace, mitigating the risks of mobile applications, and changing your thought process when it comes to securing the consumerization of IT.
Posted: 10 Oct 2012 | Published: 09 Oct 2012

SearchSecurity.com

Information Security Magazine - May 2012
sponsored by SearchSecurity.com
EZINE: Access this month’s issue to uncover strategies for taming the bring-your-own-device (BYOD) tide. In addition, explore other featured topics including VMware’s security partner program revamp, four keys to data loss prevention (DLP) success, top considerations for information security career recruitment and more.
Posted: 01 May 2012 | Published: 01 May 2012

SearchSecurity.com

Mobile Device Management: Fundamental steps for success
sponsored by SearchSecurity.com
WHITE PAPER: This expert e-guide from SearchConsumerization.com will highlight a number of ways IT can prepare for the influx of mobile devices into the workplace and lay the foundation needed to successfully support mobility. Learn about setting up your network structure for mobility, fundamental features for success when choosing an MDM system, and more.
Posted: 29 May 2013 | Published: 29 May 2013

SearchSecurity.com

The Best of RSA: Mobile Security
sponsored by SearchSecurity.com
EGUIDE: To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies.
Posted: 03 May 2012 | Published: 03 May 2012

SearchSecurity.com

Weighing the Options for an Enterprise Mobility Strategy
sponsored by SearchSecurity.com
EGUIDE: In this E-Guide from SearchConsumerization.com, uncover the importance of an enterprise mobility strategy and learn more about the pros and cons of the top three options today: Mobile device management, mobile application management, and mobile information management.
Posted: 06 Mar 2013 | Published: 06 Mar 2013

SearchSecurity.com

The State of Cloud Based Security - Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs
sponsored by Webroot
WHITE PAPER: Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.
Posted: 30 Jan 2012 | Published: 30 Jan 2012

Webroot

Choosing an MDM System: Fundamental Features for Success
sponsored by Fiberlink
EGUIDE: This essential e-guide from our experts at SearchSecurity.com will help you understand the technologies and practices you need to implement in order to make your BYOD security program effective. Inside, you'll find a breakdown of the fundamental security features needed for BYOD management, a mobile device management checklist, and more.
Posted: 24 May 2013 | Published: 24 May 2013

Fiberlink

Mobility & Security: Dazzling Opportunities, Profound Challenges – Carnegie Mellon CyLab
sponsored by Intel Security
WHITE PAPER: For this report, McAfee teamed up with Carnegie Mellon University to examine the current state of mobile security, some common problems and some recommendations that all businesses and consumers should consider.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

Intel Security

BYOD and the new network access
sponsored by SearchNetworking.com
EZINE: This month's cover story, "BYOD Challenges That Lurk Beyond Network Security", discusses five specific networking challenges associated with BYOD and examines the steps organizations have taken in an attempt to handle these issues.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

SearchNetworking.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement