IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Mobile Messaging Security

RSS Feed   
Mobile Messaging Security White Papers (View All Report Types)
 
Top 5 IT Considerations for Secure Wireless Email
sponsored by Sybase iAnywhere
WHITE PAPER: The use of wireless email has exploded over the last several years and IT has struggled to keep up with the security challenges. Read this white paper to learn about the top five considerations for secure wireless email.
Posted: 06 Jun 2007 | Published: 01 Jan 2006

Sybase iAnywhere

10 Steps to Mobile Security
sponsored by Sybase iAnywhere
WHITE PAPER: Security is the top priority on everyone's minds, especially with the growth of mobile devices on the rise. This paper details the 10 critical steps to ensure a successful mobile security strategy.
Posted: 02 Jan 2007 | Published: 01 Nov 2006

Sybase iAnywhere

Successful Mobile Deployments Require Robust Security
sponsored by BlackBerry
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 15 Oct 2010 | Published: 20 May 2009

BlackBerry

Successful Mobile Deployments Require Robust Security
sponsored by Lopez Research
WHITE PAPER: Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection.
Posted: 20 May 2009 | Published: 20 May 2009

Lopez Research

BlackBerry Enterprise Server for IBM Lotus Domino Version 4.1: Feature and Technical Overview
sponsored by BlackBerry
WHITE PAPER: Learn about the next step in wireless networking, the BlackBerry Enterprise Server. This paper provides an in-depth look at its architecture, components and key technical features.
Posted: 21 Nov 2006 | Published: 20 Feb 2006

BlackBerry

The CIO's Guide to Fixed Mobile Convergence
sponsored by BlackBerry
WHITE PAPER: Organizations seeking solutions that provide high-performance access while addressing security needs can leverage fixed mobile convergence (FMC) systems to enhance communication. This document explores why your organization should implement an FMC solution, the benefits of FMC and considerations for methods of implementation.
Posted: 06 Apr 2010 | Published: 07 Apr 2010

BlackBerry

The Enterprise Mobile Messaging Benchmark Report
sponsored by Good Technology
WHITE PAPER: Download this white paper and discover the benefits of implementing a mobile messaging strategy and learn how to save time, increase customer responsiveness and determine the value of mobile messaging projects.
Posted: 25 Apr 2007 | Published: 01 Dec 2006

Good Technology

Why ISO/IEC 27001 Compliance is Impossible without Privileged Management
sponsored by One Identity
WHITE PAPER: Access this white paper to learn how privileged access management is critical to ISO/IEC 27001 compliance to establish, implement, maintain, assess and continually improve a robust information security management system (ISMS).
Posted: 12 Feb 2018 | Published: 12 Feb 2018

One Identity

Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 15 Feb 2018 | Published: 15 Feb 2018

CrowdStrike

Cyberespionage Campaign Hits Energy Companies
sponsored by SecurityMatters
WHITE PAPER: What will your company do if the next Dragonfly-type attack targets you? Discover why the implementation of a defense-in-depth strategy is key to successfully mitigate cyberthreats like Dragonfly.
Posted: 09 Feb 2018 | Published: 31 Dec 2017

SecurityMatters
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement