Information Security Essential Guide: Strategies for Tackling BYOD
sponsored by TechTarget Security
WHITE PAPER:
Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.
Posted: 31 May 2013 | Published: 31 May 2013
|
|
|
Cloud Endpoint Security: Considerations for Cloud Security Services
sponsored by TechTarget Security
EGUIDE:
This e-guide from our experts at SearchSecurity.com will share some important information you should know about cloud-enabled security offerings, including the benefits of a cloud-based console and the factors you need to consider when evaluating products.
Posted: 17 May 2013 | Published: 17 May 2013
|
|
|
Secure Web Gateway Overview: Implementation Best Practices
sponsored by TechTarget Security
EGUIDE:
This E-Guide from SearchSecurity.com unveils a number of best practices for implementing a web security gateway to help you get the most out of your investment. View now to learn more!
Posted: 10 May 2013 | Published: 10 May 2013
|
|
|
After Antimalware: Moving Toward Endpoint Antivirus Alternatives
sponsored by TechTarget Security
EGUIDE:
This E-Guide from SearchSecurity.com outlines why - although endpoint antimalware has become ineffective - organizations today cannot live without it. In addition, learn about alternative methods available to protect your network and endpoints.
Posted: 06 May 2013 | Published: 06 May 2013
|
|
|
Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by TechTarget Security
EGUIDE:
Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013
|
|
|
Solving the Challenges of BYOD
sponsored by TechTarget Security
WHITE PAPER:
This expert resource will discuss the the hidden costs of BYOD, the roadblocks on the way to BYOD success, how to best apply IT governance over BYOD, how to develop strategies, the software to use, and more.
Posted: 01 May 2013 | Published: 01 May 2013
|
|
|
How IFCG Protects Their Data With Managed Security
sponsored by No Panic Computing
CASE STUDY:
Independent Financial Concepts Group (IFGC) knew that they needed a solution to help them configure, secure and support the devices containing sensitive information at a low cost. Read on to learn who IFGC turned to in order to help them do just that.
Posted: 14 Jun 2013 | Published: 14 Jun 2013
|
|
|
Citrix Mobile Solutions Bundle - Product Overview
sponsored by Citrix Systems, Inc.
WHITE PAPER:
Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.
Posted: 14 Jun 2013 | Published: 06 Jun 2013
|
|
|
Mobile Device Management Live Chat
sponsored by TechTarget Security
VIRTUAL ENVIRONMENT:
In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.
Posted: 14 Jun 2013 | Premiered: 14 Jun 2013
|
|
|
Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
sponsored by DellEMC and Intel®
WHITE PAPER:
Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
Posted: 12 Jun 2013 | Published: 30 Nov 2012
|
|
|
Cloud Security, Options and Trends
sponsored by CenterBeam
WEBCAST:
Join Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.
Posted: 11 Jun 2013 | Premiered: Jun 11, 2013
|
|
|
Mobile Device Security Lacking in Most Hospital Policy Discussions
sponsored by Essextec
EZINE:
This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed.
Posted: 11 Jun 2013 | Published: 11 Jun 2013
|
|
|
User-Based Licensing for Endpoint Protection and BYOD
sponsored by OpenText Security Solutions
WHITE PAPER:
User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.
Posted: 11 Jun 2013 | Published: 11 Jun 2013
|
|
|
Network Security Visibility and Analysis Technical Guide
sponsored by TechTarget Security
EZINE:
This TechGuide explores how to improve network security visibility with network flow analysis tools, cloud security monitoring solutions and anomaly-based monitoring technology. Read on now to secure the data traveling across your network with these monitoring strategies.
Posted: 11 Jun 2013 | Published: 10 Jun 2013
|
|
|
Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors
sponsored by OpenText Security Solutions
WHITE PAPER:
This performance benchmark report reveals the results of an objective performance test conducted on eight endpoint security software products. Inside, learn which solutions are leading the pack for endpoint protection.
Posted: 30 May 2013 | Published: 17 Jan 2013
|
|
|
Choosing an MDM System: Fundamental Features for Success
sponsored by Fiberlink
EGUIDE:
This essential e-guide from our experts at SearchSecurity.com will help you understand the technologies and practices you need to implement in order to make your BYOD security program effective. Inside, you'll find a breakdown of the fundamental security features needed for BYOD management, a mobile device management checklist, and more.
Posted: 24 May 2013 | Published: 24 May 2013
|
|
|
Spector 360: User Activity Monitoring Across Windows, Mac, and BlackBerry Devices
sponsored by SpectorSoft
PRODUCT DEMO:
Spector360 puts you in front of the problem, whether it's data breaches, employee fraud or productivity losses, so you can take immediate action, minimizing any impact and improving your organization's efficiency. Click to download a free trial of Spector360, and start Monitoring 10 Employees for Free!
Posted: 23 May 2013 | Premiered: 23 May 2013
|
|
|
The Hay Group Case Study
sponsored by CenterBeam
CASE STUDY:
This brief case study takes a look at how the Hay Group, a global management consulting firm, teamed up with a third party to integrate its fleet management and service desk initiatives. Read now to learn how they addressed the needs of three key areas of their IT environment – endpoint management and security, data protection, and helpdesk.
Posted: 22 May 2013 | Published: 22 May 2013
|
|
|
Case Study - System One
sponsored by OpenText Security Solutions
CASE STUDY:
This brief case study demonstrates how System One Services, a provider of technical outsourcing solutions for clients in the energy, discovered an endpoint protection system that enhanced mobile user protection and reduced network bandwidth while providing vastly improved endpoint security.
Posted: 17 May 2013 | Published: 17 May 2013
|
|
|
IT Administrator Saves Engineering Firm More than 200 Hour a Week by Switching to Webroot SecureAnywhere Business - Endpoint Protection
sponsored by OpenText Security Solutions
CASE STUDY:
In this case study, learn how engineering and project management firm Doris, Inc. was able to combat slow scan times, complex management, and ineffective protection by investing in the right endpoint security solution.
Posted: 15 May 2013 | Published: 31 Dec 2012
|
|
|
How iOS Encryption and Data Protection Work
sponsored by Symantec Corporation
EGUIDE:
This expert guide from SearchConsumerization.com details the enablement and the methods of iOS data protection that can help you embrace modern mobility securely. Read on tho learn more about built-in iOS encryption and Apple's data protection.
Posted: 15 May 2013 | Published: 15 May 2013
|
|
|
Enterprise Mobility Management Options to Keep Corporate Data Safe
sponsored by MobileIron
EGUIDE:
This guide from out experts at SearchConsumerization.com will teach you the essential differences between MDM, MAM, and MIM you need to know in order to deploy each effectively, and how to best approach each in order to keep mobile devices and users as secure as possible. Read on to learn more.
Posted: 15 May 2013 | Published: 15 May 2013
|
|
|
Responding to—and recovering from—sophisticated security attacks
sponsored by IBM
WHITE PAPER:
In this resource, find four things you can do now to keep your organization safe. Learn what you need to know to effectively respond to and recover from sophisticated security attacks by reading on now.
Posted: 14 May 2013 | Published: 28 Feb 2013
|
|
|
Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.
sponsored by Insight
WHITE PAPER:
Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.
Posted: 13 May 2013 | Published: 13 May 2013
|
|
|
Sophos EndUser Protection Overview
sponsored by Sophos
VIDEO:
This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
Posted: 09 May 2013 | Premiered: 10 Jan 2013
|
|