IT Management  >   Systems Operations  >   Security  >   Network Security  >   Wireless Security  >  

Wireless Data Security

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Data SecurityReports
 
How to Meet your Mobile Device Management Challenges
sponsored by IBM
WHITE PAPER: This brief white paper highlights 6 key features of a mobile device management (MDM) system that will help configure devices for enterprise access and secure corporate data on smartphones and tablets – all from a single screen.
Posted: 05 Sep 2014 | Published: 05 Sep 2014

IBM

MDM Decision Time: TechTarget's Must Have Guide to Purchasing Decisions
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Visit SearchSecurity.com's IT Decision Center that focuses on MDM solutions in the marketplace today. Not only can you find the expert's take in this center but you will also have access to answers to the top 5 questions your peers have around MDM solutions directly from the top vendors in the space in one place.
Posted: 26 Jul 2013 | Premiered: 31 Jul 2013

SearchSecurity.com

The Cost and Benefits of BYOD
sponsored by SearchSecurity.com
EGUIDE: Uncover why 80% of organizations today are ill-prepared for the bring your own device (BYOD) phenomenon as you explore the benefits and security risks of this consumer-driven trend.
Posted: 06 Dec 2012 | Published: 06 Dec 2012

SearchSecurity.com

Enterprise Mobility University
sponsored by SearchConsumerization.com
VIRTUAL ENVIRONMENT: In this Enterprise Mobility University, we focus on key questions infrastructure managers, systems and virtualization administrators, and IT purchases must consider before introducing BYOD into their environments.
Posted: 25 Sep 2012 | Premiered: 26 Sep 2012


How to Create a Mobile Security Policy
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com offers advice on how to plan and define a successful mobile security policy in your organization to ensure safety and control of your employees and their devices.
Posted: 09 Oct 2012 | Published: 09 Oct 2012

SearchSecurity.com

Timely Topics: Enterprise BYOD
sponsored by Workforce Software
WHITE PAPER: This informative paper helps outline some ways to control the risks of BYOD and addresses other factors that influence your decision to establish a BYOD policy. Discover the compelling advantages of BYOD that will have your leaders deciding "when," not "if," to implement this mobile strategy.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Workforce Software

BYOD: An Opportunity for IT Evolution
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchConsumerization.com details what BYOD and the Millennial generation can bring to your enterprise and explores why aligning business needs with the tools and technologies of BYOD can put your company one step ahead of the competition.
Posted: 26 Feb 2013 | Published: 26 Feb 2013

SearchSecurity.com

Enterprise Mobility Management Options to Keep Corporate Data Safe
sponsored by MobileIron
EGUIDE: This guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.
Posted: 15 May 2013 | Published: 15 May 2013

MobileIron

Presentation Transcript: Threat Update: Top Trends to Focus on for 2012
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: In this presentation transcript, Kevin Haley, one of Symantec's security experts from the Security Technology and Response organization, discusses the Symantec's Internet Security Threat Report (ISTR), detailing the latest security research and the top trends for 2012. Find out how the security landscape will affect your organization.
Posted: 08 Jun 2012 | Published: 08 Jun 2012

Symantec Corporation

Ponemon Global Study on Mobility Risks
sponsored by Websense, Inc.
WHITE PAPER: With the proliferation of mobile devices only progressing, it’s important fully to understand this trend to know how to build a robust security strategy to mitigate risks. This resource uncovers key findings based on a survey of 4,640 IT pros, exploring the major security issues of mobility and what they are doing to effectively address them.
Posted: 16 Apr 2012 | Published: 01 Feb 2012

Websense, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement