IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Wireless Data Security

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Data Security Reports
A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
sponsored by
EGUIDE: In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
Posted: 25 Jun 2013 | Published: 25 Jun 2013

Mobile Security Software Keeps Corporate Data Safe
sponsored by
EGUIDE: In this E-Guide from, discover how implementing mobile security software can help protect your corporate data from the inherent risks of the BYOD phenomenon.
Posted: 20 Nov 2012 | Published: 20 Nov 2012

Securing Data, Not Endpoints: The Best Way to Control Consumerization
sponsored by
EGUIDE: Discover why securing the data – rather than the endpoint – is the best way of controlling consumerization in your organization.
Posted: 27 Nov 2012 | Published: 27 Nov 2012

Mobile Configuration Management Functions for Successful MDM
sponsored by
EGUIDE: Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from, you'll get a detailed look at the considerations you need to take concerning configuration management.
Posted: 02 Jul 2013 | Published: 02 Jul 2013

What’s the Best Focus for MDM Strategy Now?
sponsored by
EBOOK: This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

SharePoint Security Should Not Be an Afterthought
sponsored by Thawte Inc.
EGUIDE: This expert guide from will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.
Posted: 20 May 2013 | Published: 20 May 2013

Thawte Inc.

Protection for Every Enterprise: How BlackBerry 10 Security Works
sponsored by BlackBerry
WHITE PAPER: If you're choosing a platform for enterprise-grade mobile device management, security probably tops your list of requirements. Learn how BlackBerry Enterprise Service 10 can help you secure and manage not only BlackBerry devices, but iOS and Android devices as well, enabling the cross-platform mobility management you need.
Posted: 29 Jun 2013 | Published: 29 Jun 2013


Red Alert: Why Tablet Security Matters
sponsored by BlackBerry
PRODUCT OVERVIEW: While tablet computers continue to grow in popularity, for enterprises, there is much to be concerned about. Fact is, most tablets are made for consumer entertainment and not for keeping enterprise secrets. However, the exception is the highly secure, enterprise ready BlackBerry Playbook tablet.
Posted: 01 Dec 2011 | Published: 01 Dec 2011


BYOD and the new network access
sponsored by
EZINE: This month's cover story, "BYOD Challenges That Lurk Beyond Network Security", discusses five specific networking challenges associated with BYOD and examines the steps organizations have taken in an attempt to handle these issues.
Posted: 01 Feb 2013 | Published: 01 Feb 2013

Magic Quadrant for Endpoint Protection Platforms
sponsored by Sophos, Inc.
ANALYST REPORT: This in-depth Gartner Magic Quadrant compares 18 vendors and their EPPs. Inside, learn about each platform's strengths and cautions, and see how each matches up on the quality of their protection capabilities, the depth and breadth of features, and the ease of administration.
Posted: 08 Aug 2014 | Published: 08 Jan 2014

Sophos, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement