Devices Security ResearchWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Devices Security Research returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security
 •   Network Security
 •   Data Security
 •   Security Policies
 •   Endpoint Security
 •   Application Security
 •   Security Monitoring
 •   Laptops/ Notebooks/ Tablet PCs

Related Searches
 •   Capture Devices Security Research
 •   Company Devices
 •   Devices Implementing
 •   Devices Security Research Budgeting
 •   Devices Security Research Warehouse
 •   Devices Security Seminars
 •   Maintain Devices
 •   Papers Devices
 •   Suite Devices Security Research
Advertisement

ALL RESULTS
1 - 25 of 450 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Top 10 Mobile Application Risks by Veracode, Inc.

May 11, 2012 - (Free Research)
<p>In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.</p> 
(WEBCAST) READ ABSTRACT |

International Mobile Security: Survey Research Highlights and Considerations for Enterprise IT by Cisco (E-mail this company)

December 31, 2013 - (Free Research)
This informative whitepaper explores the role of network security in an increasingly mobile workplace and what you can do to enhance employee productivity. 
(WHITE PAPER) READ ABSTRACT |

The iPad Invasion: Leveraging SharePoint for Mobile Enterprise Security by Colligo Networks Inc.

June 28, 2012 - (Free Research)
In order to leverage SharePoint and provide data access across a variety of technologies and locations, businesses everywhere are looking to integrate tablets into the enterprise, particularly the iPad. Check out this webcast to hear more on how iPads are changing the IT landscape and common challenges for iPads in the enterprise. 
(WEBCAST) READ ABSTRACT |

The iPad Invasion: Leveraging SharePoint for Mobile Enterprise Security by Colligo Networks Inc.

June 28, 2012 - (Free Research)
In order to leverage SharePoint and provide data access across a variety of technologies and locations, businesses everywhere are looking to integrate tablets into the enterprise, particularly the iPad. Check out this webcast to hear more on how iPads are changing the IT landscape and common challenges for iPads in the enterprise. 
(WEBCAST) READ ABSTRACT |

Defining and Enforcing a Clear Mobile Device Security Policy by BlackBerry

February 18, 2013 - (Free Research)
If you have not set up your mobile device security plan, this E-Guide from searchSecurity.com can help. Read on to discover the importance of a new mobile security strategy, what to consider, how to address BYOD, and more. 
(EGUIDE) READ ABSTRACT |

Mobile device protection: tackling mobile device security risks by Juniper Networks, Inc.

June 04, 2012 - (Free Research)
The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated. 
(EGUIDE) READ ABSTRACT |

An effective mobile device security policy by McAfee, Inc.

November 28, 2011 - (Free Research)
Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present. 
(EGUIDE) READ ABSTRACT |

Mobile Device Security Overview by BlackBerry

September 29, 2011 - (Free Research)
This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more. 
(EGUIDE) READ ABSTRACT |

Mobile Device Security: Emerging Threats, Essential Strategies by Juniper Networks, Inc.

February 15, 2012 - (Free Research)
In this resource, explore the emerging threats organizations face with the rise of mobile computing. View now to discover key strategies for securing mobile devices, including the essential requirements for an effective solution. 
(WHITE PAPER) READ ABSTRACT |

Expert Discussion: Mobile device security in health care by Hewlett-Packard Company

April 12, 2012 - (Free Research)
This E-Guide discusses some of the most significant trends and themes concerning mobile device security in health IT. Discover what it will take to deploy a stable, cost-efficient mobile security system in your hospital. 
(EGUIDE) READ ABSTRACT |

Successful Mobile Deployments Require Robust Security by Lopez Research

May 20, 2009 - (Free Research)
Now that mobility has become an integral part of an enterprise's infrastructure, IT must now support and secure these mobile devices. Read this whitepaper to find out the unique security requirements that these mobile devices create and the three components of mobile security protection. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Security: What Senior Managers Should Know by Sophos, Inc.

October 31, 2012 - (Free Research)
In this article, find practical advice to help you effectively manage the iPads, Android phones, and other next-generation mobile devices in your organization in order to minimize risk and drive business success. 
(WHITE PAPER) READ ABSTRACT |

Mobile Health Handbook: Device Security by SearchHealthIT.com

March 06, 2013 - (Free Research)
Finding the balance between convenience and security is the key for successful mobile device management. Review expert techniques and strategies for achieving this objective in this handbook on mobile device security for the health care organization. 
(EBOOK) READ ABSTRACT |

Technical Guide on Mobile Security by SearchSecurity.com

November 01, 2011 - (Free Research)
Techtarget's Security Media Group presents a comprehensive guide to mobile device security. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on the issue. 
(EGUIDE) READ ABSTRACT |

Top 10 Considerations for a Secure Mobile Enterprise. by Juniper Networks, Inc.

May 03, 2012 - (Free Research)
This essential white paper explores ten rules every organization must follow to ensure the security of mobile devices in the enterprise. 
(WHITE PAPER) READ ABSTRACT |

The Best of RSA: Mobile Security by Kaspersky Lab

May 03, 2012 - (Free Research)
To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies. 
(EGUIDE) READ ABSTRACT |

EssentialEnterprise Mobile Device Security Controls and Policies by BlackBerry

August 26, 2013 - (Free Research)
In this expert guide from SearchSecurity.com, find out what mobile security controls you need to consider when formulating an enterprise mobility strategy, so that you can reap the benefits of increased productivity and efficiency without putting your sensitive data at risk. 
(EGUIDE) READ ABSTRACT |

Mobile Device Security Lacking in Most Hospital Policy Discussions by Essextec

June 11, 2013 - (Free Research)
This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed. 
(EZINE) READ ABSTRACT |

Ensuring the security of your mobile business intelligence by IBM

September 24, 2012 - (Free Research)
Organizations need to know that when their employees access BI applications from their mobile devices, whether from a native application or the web, that security measures are in place to ensure their BI data is protected and safe from hackers or if a device is ever lost or stolen. Read to find strategies on how to best secure BI on mobile devices. 
(WHITE PAPER) READ ABSTRACT |

July Technical Guide on Network Security by SearchSecurity.com

July 18, 2012 - (Free Research)
Attackers moving from server to server on your network can be difficult to detect, especially if they develop code that evades detection. Network threat detection is more complex and important than ever with attackers stealing payment information or other valuable data. This informative white paper outlines how to better safeguard your network. 
(WHITE PAPER) READ ABSTRACT |

A holistic approach to your BYOD challenge by Insight

May 10, 2013 - (Free Research)
Ensuring security of business applications on personal devices and maintaining unified wired and wireless visibility and management is key for BYOD. This white paper discusses the most critical requirements for effective BYOD management and offers advice on how IT can successfully manage this trend. 
(WHITE PAPER) READ ABSTRACT |

Mobile Application Security Best Practices to Protect Corporate Data by Thawte Inc.

July 11, 2013 - (Free Research)
This expert guide from SearchConsumerization.com explains the risks associated with mobile devices and discusses native security measures built into mobile operating systems and best practices for mitigating common mobile application security risks. 
(EGUIDE) READ ABSTRACT |

It's All About Security: Things to Know Before You Open The Doors To Smartphones and Tablets in Your Enterprise by Sybase, an SAP company

June 01, 2011 - (Free Research)
This white paper discusses mobile device security threats and how IT can manage and secure devices. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to protect end users, their devices, and the network infrastructure. 
(WHITE PAPER) READ ABSTRACT |

IDC: Mobile Enterprise Management 2.0: Best Practices for Secure Data Management Across Any Device by Citrix

November 14, 2013 - (Free Research)
This crucial paper discusses how the surface area of risk has dramatically increased, and also examines what kind strategies and best practices you can employ to secure corporate data on mobile devices. 
(WHITE PAPER) READ ABSTRACT |

User-Based Licensing for Endpoint Protection and BYOD by Webroot

June 11, 2013 - (Free Research)
User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 450 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts