Threat Management: Devising a new strategy to tackle today's cyberattacks
sponsored by TechTarget Security
ESSENTIAL GUIDE:
This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.
Posted: 31 May 2012 | Published: 31 May 2012
|
|
|
Mobile Device Security Best Practices for BYOD
sponsored by TechTarget Security
EGUIDE:
This expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.
Posted: 06 Apr 2012 | Published: 06 Apr 2012
|
|
|
Provide Secure, Ubiquitous Data For Your Users, Or Face The Consequences!
sponsored by TechTarget Security
EBRIEF:
This E-Brief from SearchConsumerization.com explores the issues of data management and how enterprise-level file sharing and syncing solutions can allow corporate data to be safely managed on employee-owned devices.
Posted: 13 Mar 2012 | Published: 13 Mar 2012
|
|
|
Expert Tips for Managing Mobile Devices in the Enterprise
sponsored by TechTarget Security
EGUIDE:
Get expert tips for managing the mobile device explosion in the enterprise, and also learn about the brave new work of enterprise device management.
Posted: 13 Mar 2012 | Published: 13 Mar 2012
|
|
|
Best Practices for Mobile Device Management
sponsored by TechTarget Security
EGUIDE:
This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.
Posted: 17 Feb 2012 | Published: 17 Feb 2012
|
|
|
The Consumerization of IT 101
sponsored by TechTarget Security
EGUIDE:
Access this expert briefing to get answers to your most pressing questions concerning the consumerization of IT.
Posted: 15 Feb 2012 | Published: 14 Feb 2012
|
|
|
Considering a BYOPC Strategy: A Q&A
sponsored by TechTarget Security
EGUIDE:
Discover the concerns, opportunities, and benefits of enabling a BYOPC initiative in your workplace, including why enforcing a strict policy beforehand is essential to its success.
Posted: 10 Feb 2012 | Published: 09 Feb 2012
|
|
|
Enterprise Device Management: A Brave New World
sponsored by TechTarget Security
EGUIDE:
Learn how implementing a strong mobile device management solution can help you avoid security risks and compliance violations while allowing access by your users personal devices.
Posted: 06 Feb 2012 | Published: 06 Feb 2012
|
|
|
IT Security: Built-In Protection with Intel vPro Technology
sponsored by Intel
WHITE PAPER:
New security threats are constantly emerging, and it is your responsibility to properly protect your business. This white paper discusses four key aspects of IT security and explains how you can effectively address them by implementing processors with built-in security features.
Posted: 12 Jun 2012 | Published: 01 May 2012
|
|
|
Bringing Order to the Chaos of “Bring Your Own Device”
sponsored by Enterasys
WHITE PAPER:
In order to fully accept the “Bring Your Own Device” (BYOD) trend in your enterprise, it is vital to find a solution that provides security, scalability, centralized policy, and a superior end-user experience. Learn how you can bring order to the chaos of BYOD, plus details of a solution that can help you achieve this.
Posted: 01 Jun 2012 | Published: 30 Apr 2012
|
|
|
Enabling High Performance for Apple iPads in the Enterprise
sponsored by Aruba Networks
WHITE PAPER:
Learn how you can integrate iPads into your wireless LAN, facilitating the adoption of tablets into your workplace. Start delivering scalable performance for all mobile devices, helping you create an on-demand, always available enterprise.
Posted: 30 May 2012 | Published: 20 Sep 2011
|
|
|
Bit9 Parity for Servers: International Communications Company Locks Down Domain controllers
sponsored by Bit9, Inc.
CASE STUDY:
Domain controllers have become an increasingly popular target for malicious hackers for its access to an organization’s sensitive and intellectual property. This case study uncovers how one international communications firm was able to protect 225 of its domain controllers using Bit9 Parity for Servers and the key benefits they gained.
Posted: 23 May 2012 | Published: 23 May 2012
|
|
|
Kaspersky Endpoint Security 8 for Windows
sponsored by Kaspersky
WHITE PAPER:
Organizations today must chose and implement the right tools to help control and manage the increasing array of applications, devices and Web content. In this report, uncover a comparative functionality evaluation of Kasperksy Lab’s Endpoint Security 8 for Windows and five other leading endpoint security suites. View now to explore key findings.
Posted: 08 May 2012 | Published: 03 Oct 2011
|
|
|
About to Buy: Mobile Device Management Software
sponsored by GroupLogic
EBOOK:
Discover how you can take back control of your enterprise from the influx of personally owned mobile devices with the help of mobile device management (MDM) software.
Posted: 05 Apr 2012 | Published: 30 Mar 2012
|
|
|
Network Evolution E-Zine: Network security in a world of mobile workers
sponsored by TechTarget Networking
EZINE:
In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance.
Posted: 01 Apr 2012 | Published: 29 Mar 2012
|
|
|
Understanding Mobility Trends and Mobile Usage Among Business Users
sponsored by iPass Inc.
WHITE PAPER:
Technology and data consumption are evolving faster than mobile networks are able to adapt; what we at iPass are calling “Mobile Darwinism.” Learn more as you explore mobility trends and mobile usage among business users.
Posted: 14 Mar 2012 | Published: 14 Mar 2012
|
|
|
The Ten "Must Haves" for Secure Mobile Device Management
sponsored by Zenprise
WHITE PAPER:
Discover why an end-to-end mobile security framework is vital to protecting your network, corporate information, and the devices accessing them.
Posted: 08 Mar 2012 | Published: 30 Dec 2011
|
|
|
Cisco CleanAir Technology
sponsored by Cisco Systems, Inc.
WEBCAST:
Watch now to learn how you can balance anywhere, any device, any time access with the policy controls you need and also offering a high-quality end-user experience.
Posted: 02 Mar 2012 | Premiered: Mar 2, 2012
|
|
|
Tips for planning and executing a migration to Windows 7
sponsored by MCPc
EGUIDE:
Migrating hundreds of desktops to Windows 7 can be a grueling task. This essential e-guide presents the top challenges associated with a Windows 7 migration. Discover why you should plan your move in two phases: planning and execution, and learn how to keep these two phases separate.
Posted: 02 Mar 2012 | Published: 01 Mar 2012
|
|
|
Providing effective endpoint management at the lowest total cost
sponsored by IBM
WHITE PAPER:
Endpoint management technologies ensure that servers, workstations, laptops, mobile devices, and virtually any other network-connected device are kept up-to-date and correctly configured. Read on to investigate the total cost of ownership, or TCO, of an endpoint management investment.
Posted: 23 Feb 2012 | Published: 01 Apr 2011
|
|
|
The Age of Agility: Business Intelligence for your Business
sponsored by IBM
EZINE:
Be the first to check out the inaugural issue of Click, an e-zine full of insightful articles dedicated to helping you discover the business and IT solutions that work well for you. This edition is packed with vital information on everything from business intelligence (BI) and cloud computing to collaboration and social networking tools.
Posted: 23 Feb 2012 | Published: 22 Feb 2012
|
|
|
Mobility Solutions
sponsored by Azzurri
WHITE PAPER:
Enabling and supporting mobility can be complicated, especially when it comes to integrating it with company policy. Discover how a mobility solution can help you with all this.
Posted: 21 Feb 2012 | Published: 21 Feb 2012
|
|
|
Securing Today’s Mobile Workforce
sponsored by Juniper Networks, Inc.
WHITE PAPER:
BYOD has placed many challenges on enterprises, namely concerning security. Learn how Junos Pulse and the Junos Pulse Mobile Security Suite can help alleviate your issues.
Posted: 15 Feb 2012 | Published: 15 Feb 2012
|
|
|
Implementing business tablets instead of BYOD
sponsored by Kensington
EGUIDE:
Discover why tablets are overtaking BYOD, use cases of tablets in the workplace, plus which tablet is leading the change.
Posted: 14 Feb 2012 | Published: 14 Feb 2012
|
|
|
Protecting Corporate Data in the "BYOD" Environment
sponsored by Apperian, Inc.
WHITE PAPER:
While BYOD offers many benefits to your business, it is imperative that you insure the integrity of your corporate assets.
Posted: 10 Feb 2012 | Published: 09 Feb 2012
|
|