IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Mobile Security

RSS Feed   
Mobile Security Reports
 
Secure Everywhere: The Power of Integrated Internet, Endpoint & Email Security
sponsored by Cisco Umbrella
RESOURCE: Organizations today are struggling to find the resources needed to identify and address security gaps within their networks. This e-book is designed to help get you started by highlighting the challenges that lead to security gaps and overviewing the benefits of an integrated approach to security. Read on to learn more.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Cisco Umbrella

KCOM
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how KCOM, a UK-based systems integrator, partnered with Absolute to address the increasing demands of their increasingly dispersed workforce without sacrificing compliance or operational efficiency.
Posted: 17 Feb 2020 | Published: 13 May 2019

Absolute Software Corporation

Emergency Communications of Southern Oregon
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Emergency Communications of Southern Oregon (ECSO), an emergency dispatch facility, was able to save lives through their partnership with Absolute by ensuring endpoint visibility and security to increase efficiency and meet CJIS compliance.
Posted: 21 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation

Pulse Secure Webinar Podcast
sponsored by Pulse Secure
PODCAST: Amidst the COVID-19 health crisis, organizations must adjust for increased mobility, connectivity and work from home mandates. This emergency workplace shift can stress IT infrastructure and operations. In this podcast, listen as experts share real-world insights to ensure business resiliency, user productivity and secure access.
Posted: 10 Apr 2020 | Premiered: Apr 10, 2020

Pulse Secure

Mimecast Mobile: The Experience Employees Want With the Control You Need
sponsored by mimecast
DATA SHEET: Access to information from anywhere is critical to increasing employee's productivity. However, without the appropriate security and controls in place, this can increase your risk of a breach. In this data sheet, learn how Mimecast Mobile allows employees to securely access the information they need.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

mimecast

Magecart Attack on Focus Camera
sponsored by Tala Security
WHITE PAPER: Magecart attacks continue to plague websites and sensitive customer data. In this solution brief, learn how Tala Security protects against client-side attacks by exploring the features and capabilities the enable them to provide website security.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Tala Security

Product Overview
sponsored by Armorblox
PRODUCT OVERVIEW: In this product overview, take a closer look at the capabilities and features of Armorblox: A cloud-native email security platform that addresses the inbound and outbound security threats plaguing today’s email platforms. Read on to learn more.
Posted: 20 Feb 2020 | Published: 05 Feb 2020

Armorblox

Chart Industries Vaporizes Ransomware and Malware
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the journey of Chart Industries, a global manufacturer and distributer, as they partner with Malwarebytes to address the growing risk of malware and phishing attacks targeted at mobile workers and endpoints. Download the report to see the results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Ivanti Helps Companies Manage, Secure and Deliver IT for a Remote Workforce
sponsored by Ivanti SEA
RESOURCE: The recent spread of COVID-19 has led to record amounts of remote workers. As a result, home networks and devices have become the top target for cyberattackers looking to take advantage of a situation. In this blog post, discover the various ways Ivanti may be able to help alleviate these pain points.
Posted: 21 Apr 2020 | Published: 08 Apr 2020

Ivanti SEA

Securing Your Wherever Whenever Workforce
sponsored by Forcepoint
EBOOK: Currently, 87% of organizations rely on employee access to business apps from personal devices. While BYOD trend allows for unhindered agility and collaboration, it also invites additional security risks. In this e-book, uncover the truth about cloud security, and learn how to optimize your mobile-cloud security strategy.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info