Device SecureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Device Secure returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Network Security
 •   Endpoint Security
 •   Wireless Security
 •   Data Security
 •   Application Security
 •   Security Policies
 •   Laptops/ Notebooks/ Tablet PCs
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Definitions Device Secure
 •   Device Secure Demos
 •   Device Secure Packages
 •   Device Secure Performance
 •   Device Secure Product
 •   Importing Device Secure
 •   Issues On Device Secure
 •   Portals Device Secure
 •   Product Device Secure
 •   Uk Device Secure
Advertisement

ALL RESULTS
1 - 25 of 430 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Productivity, Mobility and Efficiency: Keeping Your Devices Secure by Cisco Systems, Inc.

November 07, 2012 - (Free Research)
In this research report, uncover how organizations are – or should be – responding to the invasion of mobile devices in the workplace, the emerging trends in enterprise mobility today, best practices for ensuring effective mobile policies, and much more! 
(WHITE PAPER) READ ABSTRACT |

Anywhere, Any Device Secure Access to Enterprise Storage with EMC Atmos and Oxygen by Intel

October 27, 2011 - (Free Research)
This white paper outlines the fundamental steps to take to build a scale-out storage cloud architecture in your enterprise. In addition, this resource offers insights on cloud topology, reducing the learning curve, and much more. 
(WHITE PAPER) READ ABSTRACT |

Anywhere, Any Device Secure Access to Enterprise Storage with EMC Atmos and Oxygen by Intel

October 05, 2011 - (Free Research)
The emergence of cloud computing and increased growth of data has driven new usage models for how storage is used and deployed. This resource defines a scale-out storage cloud reference architecture that can help to simplify the deployment of your first cloud infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Applications and best practices to keep your mobile devices secure by Good Technology

March 06, 2012 - (Free Research)
Uncover best practices for keeping your mobile devices and applications secure. 
(EGUIDE) READ ABSTRACT |

Design Security Policies For #GenMobile by Aruba Networks

April 01, 2014 - (Free Research)
This exclusive resource discusses how your organization can form an effective mobile strategy designed to help you get the most value from your mobile initiatives. 
(WHITE PAPER) READ ABSTRACT |

Protection For Every Enterprise, How BlackBerry Security Works by BlackBerry

March 17, 2014 - (Free Research)
This exclusive paper discusses mobile management platform that's been built from the ground up to deliver a high-quality user experience while adhering to the ever-shifting demands of keeping your devices secure. 
(WHITE PAPER) READ ABSTRACT |

Achieving a BYOD (Bring-Your-Own-Device) Strategy That Works for You by Insight

May 06, 2013 - (Free Research)
Read this white paper to learn five key steps that will help you create a successful BYOD management strategy. Read on and learn the best ways to address device policies, security threats, employee awareness, and more. 
(WHITE PAPER) READ ABSTRACT |

6 Reasons Why Software-Based Encryption Doesn’t Stack Up by MXI Security

April 30, 2010 - (Free Research)
Read this white paper to learn the key differences between hardware-based and software-based encryption, which are becoming widely used technologies for companies using encrypted USB drives to ensure they are keeping their data secure as well as meeting industry security regulations. 
(WHITE PAPER) READ ABSTRACT |

Mobile Security: Top Five Security Threats for the Mobile Enterprise and How to Address Them by GroupLogic

September 15, 2011 - (Free Research)
Although mobile computing can offer a number of opportunities to drive substantial value to the enterprise, it does not come without risk. View this paper to discover the top 5 security threats to the mobile enterprise and solutions on how to avoid them while fostering happy employees, productivity and streamlined workflows. 
(WHITE PAPER) READ ABSTRACT |

Accelerating the deployment of a secure mobile enterprise by IBM

April 03, 2014 - (Free Research)
In this insightful white paper, explore key challenges you'll face in ensuring the security of enterprise mobile devices, learn strategies that will help you reduce risk, and discover new ways that you can be more secure in your use of mobile technology. 
(WHITE PAPER) READ ABSTRACT |

Accelerating the deployment of a secure mobile enterprise by IBM

October 31, 2013 - (Free Research)
In this insightful white paper, explore key challenges you'll face in ensuring the security of enterprise mobile devices, learn strategies that will help you reduce risk, and discover new ways that you can be more secure in your use of mobile technology. 
(WHITE PAPER) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Secure iPhone Access to Corporate Web Applications by F5 Networks

November 13, 2013 - (Free Research)
This exclusive resource discusses how your organization can secure one of the top mobile devices on the market, ensuring that its access to corporate web applications is safe. 
(WHITE PAPER) READ ABSTRACT |

Enabling Safe and Secure BYOD in the Enterprise by Dell Software

August 02, 2013 - (Free Research)
This exclusive paper discusses a fully integrated solution for managing supported desktops, laptops servers, and mobile devices, making secure BYOD an achievable reality for your organization. 
(WHITE PAPER) READ ABSTRACT |

MDM for a Secure Mobile Workforce by BlackBerry

November 18, 2013 - (Free Research)
This expert guide from SearchSecurity.com provides an in-depth and highly topical review of current and near-future technologies, and deployment-tested implementation procedures that can help your organization secure your mobile workforce. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

Mobilizing Lotus Domino by Sybase iAnywhere

April 26, 2007 - (Free Research)
Mobile applications must be as reliable and secure as those that run within the enterprise. View this webcast to get a demonstration of focused features to secure wireless email. 
(WEBCAST) READ ABSTRACT |

The Ten "Must Haves" for Secure Mobile Device Management by Zenprise

December 30, 2011 - (Free Research)
Discover why an end-to-end mobile security framework is vital to protecting your network, corporate information, and the devices accessing them. 
(WHITE PAPER) READ ABSTRACT |

Securing mobile device in the business environment by IBM

February 24, 2014 - (Free Research)
This exclusive paper examines how your organization can best introduce mobile devices into the workplace in a secure manner, identifying the risks inherent in their broader access to corporate data while deriving enhanced business value. 
(WHITE PAPER) READ ABSTRACT |

The Importance of Securing Mobile Device Platforms by Dell Software

September 30, 2013 - (Free Research)
Access this informative resource to discover which mobile security solutions are recommended for Apple, Android and Microsoft Windows devices. 
(WHITE PAPER) READ ABSTRACT |

IDC: Mobile Enterprise Management 2.0: Best Practices for Secure Data Management Across Any Device by Citrix

November 14, 2013 - (Free Research)
This crucial paper discusses how the surface area of risk has dramatically increased, and also examines what kind strategies and best practices you can employ to secure corporate data on mobile devices. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: How to Secure Your Mobile Devices by Dell SecureWorks UK

August 22, 2011 - (Free Research)
In this presentation transcript, Paul Pearston, a Senior Security Engineer at Dell SecureWorks, discusses the most serious security threats to mobile devices and recommends specific approaches for securing the mobile organization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

The Ten "Must Haves" for Secure Mobile Device Management by Zenprise

August 03, 2012 - (Free Research)
Uncover the risks mobile devices bring to your enterprise and how an end-to-end mobile security framework can help you monitor, control, and protect the devices accessing your network and corporate data and applications. 
(WHITE PAPER) READ ABSTRACT |

Browser based access to Windows applications and desktops – AccessNow by Ericom by Ericom Software

October 28, 2011 - (Free Research)
Try this free trial download to learn about a technology that delivers pure browser-based access to business-critical Windows resources from any PC, Mac, Linux, Chromebook, iPad, Android, and other HTML5-enabled device. 
(TRIAL SOFTWARE) READ ABSTRACT |

Dell DVS Enterprise - Mobile Secure Desktop by Dell and VMware

June 11, 2013 - (Free Research)
This informative white paper examines a mobile desktop solution that allows IT to securely support device diversity and BYOD policies, tying the desktop environment to the user identity instead of the device. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Workplace Mobility and BYOD with the VMware Horizon Mobile Secure Workplace by VMware, Inc.

September 12, 2013 - (Free Research)
This informative webcast examines how desktop virtualization is emerging as the go-to solution for these BYOD issues, and takes a look at a tool that can secure your mobile environment while streamlining management. 
(WEBCAST) READ ABSTRACT |

1 - 25 of 430 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts