Information Security Essential Guide: Strategies for Tackling BYOD
sponsored by TechTarget Security
WHITE PAPER:
Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.
Posted: 31 May 2013 | Published: 31 May 2013
|
|
|
Solving the Challenges of BYOD
sponsored by TechTarget Security
WHITE PAPER:
This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013
|
|
|
How Cloud-Based Mobile Device Security Streamlines Data Protection
sponsored by TechTarget Security
WHITE PAPER:
Read this whitepaper to discover why cloud-based security offers superior data protection in today's mobile workplace.
Posted: 13 Mar 2013 | Published: 13 Mar 2013
|
|
|
Exploring new web browser security capabilities
sponsored by TechTarget Security
WHITE PAPER:
New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.
Posted: 04 Oct 2012 | Published: 04 Oct 2012
|
|
|
Strategy for Securing Mobile Content - 5 Key Guidelines
sponsored by Accellion, Inc.
WHITE PAPER:
Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.
Posted: 28 Jun 2013 | Published: 28 Jun 2013
|
|
|
How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER:
Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013
|
|
|
File Sync and Share vs. Endpoint Backup
sponsored by Code42
WHITE PAPER:
This short white paper provides insight into clearing up the confusion between backup and sync/share.
Posted: 26 Jun 2013 | Published: 26 Jun 2013
|
|
|
Accellion raises the bar in secure cloud-based file sharing
sponsored by Accellion, Inc.
WHITE PAPER:
The vendor featured in this whitepaper recently released new tools for collaboration functionality and is eager to prove itself as a strong competitor in the enterprise collaboration market. Read on to learn how they can help your organization adopt truly secure cloud-based file sharing.
Posted: 25 Jun 2013 | Published: 04 Dec 2012
|
|
|
Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
sponsored by Citrix
WHITE PAPER:
Explore the details of an end-to-end mobility solution that simplifies mobile integration into the network and helps you overcome the top challenges enterprise mobility presents, from visibility and management to scalability and security.
Posted: 14 Jun 2013 | Published: 30 Apr 2013
|
|
|
Citrix Mobile Solutions Bundle - Product Overview
sponsored by Citrix Systems, Inc.
WHITE PAPER:
Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.
Posted: 14 Jun 2013 | Published: 06 Jun 2013
|
|
|
Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
sponsored by DellEMC and Intel®
WHITE PAPER:
Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
Posted: 12 Jun 2013 | Published: 30 Nov 2012
|
|
|
User-Based Licensing for Endpoint Protection and BYOD
sponsored by OpenText Security Solutions
WHITE PAPER:
User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013
|
|
|
Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors
sponsored by OpenText Security Solutions
WHITE PAPER:
This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.
Posted: 30 May 2013 | Published: 17 Jan 2013
|
|
|
Responding to—and recovering from—sophisticated security attacks
sponsored by IBM
WHITE PAPER:
In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
Posted: 14 May 2013 | Published: 28 Feb 2013
|
|
|
Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.
sponsored by Insight
WHITE PAPER:
Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.
Posted: 13 May 2013 | Published: 13 May 2013
|
|
|
SymEd Solutions from Symantec: Endpoint Management and Mobility
sponsored by Insight Public Sector and Symantec
WHITE PAPER:
Uncover how to safely deploy IT in academia and revolutionize the experience of students and teachers alike without compromising security in today's threat-filled landscape.
Posted: 29 Apr 2013 | Published: 31 Dec 2012
|
|
|
The Trouble Heading for Your Business 2013
sponsored by Trend Micro
WHITE PAPER:
This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
Posted: 16 Apr 2013 | Published: 28 Feb 2013
|
|
|
Security in the Age of Mobility
sponsored by Trend Micro
WHITE PAPER:
This resource will give you a comprehensive look at the threats that mobile users and mobile organizations face today. Learn more about data breaches, social media threats, and more.
Posted: 15 Apr 2013 | Published: 31 Dec 2012
|
|
|
PassMark Success: Endpoint Protection
sponsored by Symantec Corporation
WHITE PAPER:
Check out this video to find out more about a solution that has been given might marks by PassMark in terms of performance, and find out what it can do for your organization.
Posted: 10 Apr 2013 | Published: 10 Apr 2013
|
|
|
2012 Endpoint Security Best Practices Survey Results
sponsored by Symantec Corporation
WHITE PAPER:
This informative white paper reveals the results of a survey centered on endpoint security best practices. Inside, learn the factors that separate endpoint security leaders from laggards, and learn what you can do to stay protected.
Posted: 08 Apr 2013 | Published: 08 Apr 2013
|
|
|
2012 - Endpoint Security Best Practices Survey
sponsored by Symantec Corporation
WHITE PAPER:
Consult this informative resource to find out more about securing your endpoints. It outlines the best practices to avoid a cyber-attack along with many other helpful recommendations.
Posted: 06 Sep 2012 | Published: 06 Sep 2012
|
|
|
Cloud-delivered Endpoint Security
sponsored by OpenText Security Solutions
WHITE PAPER:
Learn why protecting your endpoints with cloud-based services can help you improve your level of protection to not only the devices but also the data they contain and the individuals that use them – all at a lower cost and with better manageability.
Posted: 05 Sep 2012 | Published: 30 Apr 2012
|
|
|
Beyond Passwords & Outdated Physical Access Systems
sponsored by Entrust, Inc.
WHITE PAPER:
Learn why passwords and traditional physical access systems are simply inefficient in this day and age and discover how smart credentials are a vital component of your physical and logical access security strategy.
Posted: 05 Sep 2012 | Published: 31 Aug 2012
|
|
|
Make Life Easier - Let End Users Connect to Computers from Anywhere with My Desktop
sponsored by SysAid Technologies Ltd
WHITE PAPER:
This resource explores a remote access technology that lets your end users connect to their work computer from virtually any computer or smartphone in a cost-effective, secure, business oriented manner that your business will approve of.
Posted: 30 Aug 2012 | Published: 30 Aug 2012
|
|
|
EMA Analyst Report on the Mobile Device Management Marketspace
sponsored by IBM
WHITE PAPER:
Consult this informative white paper to gain better understanding of mobile device management with traditional desktop management capabilities. Use a consolidated endpoint management experience that can meet all enterprise challenges.
Posted: 24 Aug 2012 | Published: 24 Aug 2012
|
|