IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Mobile Security

RSS Feed    Add to Google    Add to My Yahoo!
Mobile SecurityReports
 
A New Set of Network Security Challenges
sponsored by Dell Software
WHITE PAPER: This new IDG survey reveals optimism about the ability of next-generation firewalls to help IT balance productivity and security. With both productivity and security becoming increasingly crucial, IT faces conflicting mandates from the business.
Posted: 23 Aug 2013 | Published: 23 Aug 2013

Dell Software

ESG Research: Security Management and Operations
sponsored by Hewlett-Packard Company
WHITE PAPER: The prevalent approach to security management and operations is to implement on an ad hoc and technology-focused basis. This haphazard approach is no longer adequate.  This report details the current state of the market and what to expect moving forward.
Posted: 15 Aug 2014 | Published: 30 Jun 2012

Hewlett-Packard Company

A Wireless LAN that Works for Mobile Business
sponsored by Dell, Inc.
WHITE PAPER: Businesses need a robust, consistent, and high-performing WLAN if they want to keep up with the constant changes that redefine wireless.  There are a lot of options out there, so its important to find a solution that gives you more features at a lower cost.
Posted: 21 Aug 2014 | Published: 31 May 2014

Dell, Inc.

B.Y.O.D Without the Risk
sponsored by Juniper Networks, Inc.
WHITE PAPER: As the Bring Your Own Device phenomenon continues to grow, organizations are faced with the challenge of enabling mobile access while mitigating risk. This resource explores how to transform your network into one that is robust and highly resilient in order to enable mobility, performance, access, security, management, and control that's scalable.
Posted: 06 Jun 2012 | Published: 06 Jun 2012

Juniper Networks, Inc.

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: Uncover the top five network access challenges that organizations today face and discover how a unified access control solution can provide the visibility, protection, and control you need to tackle these issues.
Posted: 21 Aug 2012 | Published: 31 Jan 2012

Juniper Networks, Inc.

Thawte in Education
sponsored by Thawte Inc.
WHITE PAPER: Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Application Control at the Wireless Edge
sponsored by Xirrus
WHITE PAPER: With the advent of BYOD, cloud computing, and wireless, IT is losing control of the corporate network. This resource introduces an application intelligent solution that gives you the visibility and control you need to meet the challenges of the BYOD world.
Posted: 31 Jul 2013 | Published: 31 Dec 2012

Xirrus

How iOS Encryption and Data Protection Work
sponsored by Symantec Corporation
EGUIDE: This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.
Posted: 15 May 2013 | Published: 15 May 2013

Symantec Corporation

Tutorial: Five Steps to Effective Wireless Networking in Healthcare
sponsored by HP & Intel®
EGUIDE: This e-guide from SearchHealthIT.com demonstrates how health IT administrators should plan, implement and manage wireless networks within their respected facilities. Read now for five steps to effective wireless networking in health care.
Posted: 30 Nov 2012 | Published: 30 Nov 2012

HP & Intel®

June Information Security Magazine
sponsored by SearchSecurity.com
EZINE: Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. Our June cover story provides insight into adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. We also look at big data analytics and security and provide an update on FedRAMP.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement