IT Management  >   Systems Operations  >   Systems Management  >  

Wireless Mobile Computing Device Management

RSS Feed    Add to Google    Add to My Yahoo!
Wireless Mobile Computing Device Management Reports
 
A CISO's Guide to Mobile Threat Defense
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Security systems need an upgrade to be able to protect mobile devices and apps in the workplace. Read this white paper to learn the 5 major threats to mobile security, then find out what steps you can take to mitigate these vulnerabilities.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Check Point Software Technologies Ltd.

Comparing Security Features: MobileIron and Microsoft Intune
sponsored by MobileIron
WEBCAST: This video describes the security differences between EMM tool MobileIron and MDM tool Microsoft Intune, comparing capabilities like encryption, secure data gateway, compliance, and more.
Posted: 07 Aug 2017 | Premiered: Apr 25, 2017

MobileIron

How to Secure Mobile Applications in a Private Cloud
sponsored by IBM
EGUIDE: In this expert e-guide, uncover the benefits and challenges of creating a private app store to control and monitor the delivery of properly secured mobile applications.
Posted: 19 Sep 2017 | Published: 19 Sep 2017

IBM

macOS Security Checklist
sponsored by JAMF
WHITE PAPER: The Center for Internet Security (CIS) benchmark for macOS is widely regarded as a comprehensive checklist for organizations to follow to secure their Macs. Download this white paper to discover how to implement the organizations security recommendations.
Posted: 18 Aug 2017 | Published: 18 Aug 2017

JAMF

Mobile Application Development at the Speed of Business with Containers
sponsored by Red Hat
EBOOK: Discover how to use container and cloud technologies to build quality mobile apps quickly. Learn how to power your native and mobile app development initiatives with microservices, enterprise-grade containers, DevOps, APIs, and more.
Posted: 05 Oct 2017 | Published: 05 Oct 2017

Red Hat

VPN Access Made Easier Without Sacrificing Security
sponsored by HID Global
JOURNAL ARTICLE: VPNs create a secure tunnel between company data and employee devices, however they don't protect against weak passwords. Access this resource to learn how to increase the security of the VPN and maintain usability.
Posted: 21 Sep 2017 | Published: 15 Aug 2017

HID Global

Make Your Digital Transformation Strategy A Reality
sponsored by Lenovo
WHITE PAPER: Regardless of what your digital transformation (DX) strategy looks like, it should be able to meet three key objectives. Download this white paper to discover how your organisation can enable workers to be mobile and productive, streamline internal operations, and ensure seamless collaboration via an effective cloud strategy.
Posted: 27 Sep 2017 | Published: 27 Sep 2017

Lenovo

Creating Trust as Mobile Banking Fraud Escalates
sponsored by HID Global
EBRIEF: Take a closer look at this white paper to uncover security risks mobile bankers are facing and what banks can do to create trust in mobile transactions
Posted: 21 Sep 2017 | Published: 21 Sep 2017

HID Global

How to Recognize and Prevent Mobile Security Threats
sponsored by Microsoft
EGUIDE: Learn how to recognize and prevent mobile security threats for application development and deployment, all while discovering how to not fall victim to the 2 most common mobility challenges.
Posted: 25 Sep 2017 | Published: 25 Sep 2017

Microsoft

Is the Endpoint Security Nightmare Ending?
sponsored by SearchSecurity.com
EBOOK: In our Insider Edition of Information Security Magazine, experts Mike Chapple, Michael Heller and David Geer dive into the newest approaches in endpoint security, keys to maturing your mobile security strategy, and more.
Posted: 17 Jul 2017 | Published: 17 Jul 2017

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement