IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Mobile Security

RSS Feed    Add to Google    Add to My Yahoo!
Mobile Security Reports
 
WLAN Access Control and Wi-Fi Network Needs
sponsored by SearchSecurity.com
EGUIDE: This white paper discusses the nature of high-density WLAN environments, their relationship to enterprise Wi-Fi, and the benefits of 802.1X authentication. Read on to learn more.
Posted: 10 May 2013 | Published: 01 Apr 2013

SearchSecurity.com

Tablets & Smartphones in the Enterprise
sponsored by SearchSecurity.com
EGUIDE: Frantic IT departments are being forced to manage BYOD on the fly. Read this white paper to get strategic, practical advice on how to manage this consumer-driven trend.
Posted: 28 Jan 2013 | Published: 01 Jan 2013

SearchSecurity.com

Protecting Data on the Go
sponsored by SearchSecurity.com
EBOOK: This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SearchSecurity.com

PBS Engineering and Environmental Bolsters Virtualized Environment with Disaster Recovery Efforts and Cuts 40 Percent in Energy Costs
sponsored by Dell and VMware
CASE STUDY: Learn how one firm improved diaster recovery efforts with virtualization and cut energy costs by 40%.
Posted: 10 Sep 2013 | Published: 31 Aug 2013

Dell and VMware

Achieving a BYOD (Bring-Your-Own-Device) Strategy That Works for You
sponsored by Insight
WHITE PAPER: Read this white paper to learn five key steps that will help you create a successful BYOD management strategy. Read on and learn the best ways to address device policies, security threats, employee awareness, and more.
Posted: 06 May 2013 | Published: 06 May 2013

Insight

Strategy for Securing Mobile Content - 5 Key Guidelines
sponsored by Accellion, Inc.
WHITE PAPER: Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.
Posted: 28 Jun 2013 | Published: 28 Jun 2013

Accellion, Inc.

Computer Weekly - 15 May 2012: Overhauling banking IT
sponsored by ComputerWeekly.com
EZINE: This week’s Computer Weekly contains an exclusive interview with JP Morgan COO India Gary-Martin about juggling multiple legacy IT systems while keeping the merchant bank compliant. We also look at how near-field communications technology promises to revolutionise consumer spending and we ask whether 2012 could be the year that APM becomes vital?
Posted: 14 May 2012 | Published: 15 May 2012

ComputerWeekly.com

Tackling the Top Five Network Access Control Challenges
sponsored by Juniper Networks, Inc.
WHITE PAPER: Uncover the top five network access challenges that organizations today face and discover how a unified access control solution can provide the visibility, protection, and control you need to tackle these issues.
Posted: 21 Aug 2012 | Published: 31 Jan 2012

Juniper Networks, Inc.

Network Security Technologies Technical Guide
sponsored by SearchSecurity.com
WHITE PAPER: Read this expert guide to learn about the latest trends and risks that threaten today's networks. Learn more about modern threat detection, device security, security assessments and more.
Posted: 03 Apr 2013 | Published: 31 Dec 2012

SearchSecurity.com

Bring Your Own Design: Simplifying BYOD with Ruckus Wireless
sponsored by Ruckus Wireless
PRESENTATION TRANSCRIPT: Uncover how to use the right Wi-Fi access points (APs) in your organization to embrace the bring your own device (BYOD) movement without sacrificing the security or manageability of your wireless network.
Posted: 04 Oct 2012 | Published: 04 Oct 2012

Ruckus Wireless
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement