Industries Mobile SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Industries Mobile Security returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security
 •   Data Security
 •   Network Security
 •   Security Policies
 •   Endpoint Security
 •   Application Security
 •   Security Monitoring
 •   Mobile Field Sales/ Wireless Connectivity

Related Searches
 •   Format Industries Mobile Security
 •   Imports Industries Mobile Security
 •   Industries Audit
 •   Industries Mobile Directory
 •   Industries Mobile Security Comparisons
 •   Industries Mobile Security File
 •   Industries Mobile Security Webcasts
 •   It Industries Mobile Security
 •   Metrics Industries Mobile Security
 •   Policies Industries
Advertisement

ALL RESULTS
1 - 25 of 443 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Out of the Cubicle and into the Field - Mobility Matters in Extending Public Service Delivery by BlackBerry

January 2007 - (Free Research)
This paper from the Center for Digital Government explores the drivers and benefits for going mobile in the public sector. It also includes success stories from early adopters, as well as suggestions for getting started. 
(WHITE PAPER) READ ABSTRACT |

May 2013 Pulse E-Zine by SearchHealthIT.com

May 2013 - (Free Research)
The quarterly Pulse e-zine delves into a range of issues affecting hospitals, doctors, payers, policymakers and other industry stakeholders. Explore the hottest topics that impact IT decision makers today and gain knowledge from peers through snapshots of trends, SearchHealthIT industry research and our on-location conference coverage. 
(EZINE) READ ABSTRACT |

HP Finextra Customer Experience Report 2013 by Hewlett-Packard Limited

December 2013 - (Free Research)
This white paper reveals the results of a survey focused on customer interaction in the banking industry, with 103 responses coming from 52 different European retail financial groups. Read on to discover the key forces that are impacting customer experiences. 
(WHITE PAPER) READ ABSTRACT |

Bring Clinical Efficiency to Point of Care (PoC) Devices by PC Connection

May 2014 - (Free Research)
Read this resource to learn how to develop a more efficient workflow by developing  an analysis solution built to fit your clinical outcome and performance metric needs. 
(WHITE PAPER) READ ABSTRACT |

How Kearney Clinic Physicians Use Mobile Diction at the Point of Care by Nuance

March 2014 - (Free Research)
View this webcast to see how Kearney Clinic improved patient care by implementing a mobile solution to gain better access to data from any point within the facility. 
(WEBCAST) READ ABSTRACT |

Defining Your Corporate Mobile Policies by SearchSecurity.com

September 2008 - (Free Research)
It's important that corporate mobile policies cover everything from what types of devices will be available to users, to how and when they can use them Read this e-guide to learn more about developing appropriate mobile policies for your organization 
(EGUIDE) READ ABSTRACT |

PCI Council issues mobile application rules for software developers by SearchSecurity.com

April 2013 - (Free Research)
The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments. 
(EGUIDE) READ ABSTRACT |

eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network by SearchMobileComputing

December 2008 - (Free Research)
Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware. 
(EBOOK) READ ABSTRACT |

Security for Wireless Networks: A Comparison among SSL, IPSec and Mobile VPNs by NetMotion Wireless

June 2008 - (Free Research)
This paper outlines common threats and issues regarding wireless security in the context of typical uses of mobile devices over wireless networks and evaluates secure remote access solutions in comparison with NetMotion Mobility XE. 
(WHITE PAPER) READ ABSTRACT |

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption by Aladdin Knowledge Systems

August 2008 - (Free Research)
Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions. 
(WHITE PAPER) READ ABSTRACT |

Mobile Virtualization and Remote Access on Windows Mobile Smartphones by Celio Corp / REDFLY Mobile Companion

August 2008 - (Free Research)
Remote access and virtualization on the smartphone is a secure and efficient way to provide the mobile workforce access to robust applications and desktop features. 
(WHITE PAPER) READ ABSTRACT |

Mobile NAC: Protecting Network Security by Protecting Mobile Endpoints by Fiberlink Communications

June 2008 - (Free Research)
This white paper discusses a new approach to Network Access Control that overcomes both of these shortcomings of conventional NAC products. 
(WHITE PAPER) READ ABSTRACT |

The CIO's Guide to Mobile Security by BlackBerry

October 2006 - (Free Research)
Mobile security is a growing concern as organizations look to gain competitive advantages through the use of a remote workforce. Read this paper to learn about the security vulnerabilities that can arise when wireless devices access corporate data. 
(WHITE PAPER) READ ABSTRACT |

Managing Security on Mobile Phones by Nokia

January 2008 - (Free Research)
This paper describes the challenges of provisioning and managing security in mobile phone environments and how a well-designed deployment system can alleviate these challenges. 
(ANALYST REPORT) READ ABSTRACT |

Enabling Next-Generation Mobile Broadband Services by LSI Corporation

November 2008 - (Free Research)
This white paper explains the broadband services that mobile carriers are beginning to add to their product lineup fall into six different categories. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 6 November 2012: The business benefits of 4G by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, as the UK's first 4G mobile network goes live, we examine the benefits for business. IT security suppliers say that cross-industry collaboration is needed – but can they work together? And we take a look at the latest wireless networking technology, known as WiGig. Read the issue now. 
(EZINE) READ ABSTRACT |

Windows Essential Business Server 2008: Deploying Windows Mobile 6 with Windows Essential Business Server 2008 by Microsoft

December 2008 - (Free Research)
This document provides step-by-step instructions for deploying devices powered with Windows Mobile 6 in an IT infrastructure that is based on the Windows Essential Business Server 2008 (Windows EBS 2008) server solution. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 6 December 2011: Read this week’s issue of the UK’s leading technology publication, featuring news on open data, cyber security and our social media awards by ComputerWeekly.com

December 2011 - (Free Research)
In this week's Computer Weekly, we examine the economic benefits of plans to release more government data for wider re-use by software developers. We announce the winners of our Social Media Awards, and hear what the IT industry thinks of the new UK cyber security strategy. Download the new issue now. 
(EZINE)

Demonstrating the Business Value of Mobile Device Management in the Enterprise by Nokia

August 2008 - (Free Research)
Mobile device management (MDM) in the enterprise has evolved with its rise from niche application to mission-critical IT process. This IDC white paper takes a look at the evolution of MDM and how it is influencing business requirements. 
(WHITE PAPER) READ ABSTRACT |

The Universal Wireless Client: How to Simplify Mobility and Reduce the Cost of Supporting Mobile Workers by Fiberlink Communications

June 2008 - (Free Research)
This document will explain how Fiberlink's Extend360 Agent™ can simplify secure connectivity to corporate WLANs, home wireless networks, and roaming WiFi and mobile data networks. 
(WHITE PAPER) READ ABSTRACT |

Managing Mobility: An IT Perspective by Nokia

August 2008 - (Free Research)
Today's workforce is rapidly becoming mobile and businesses are looking at how to capitalize on the significant benefits of enterprise mobility. This white paper examines the issues surrounding the security, manageability and costof mobility. 
(WEBCAST) READ ABSTRACT |

UNDERSTANDING PCI MOBILE PAYMENT PROCESSING SECURITY GUIDELINES by SearchSecurity.com

September 2013 - (Free Research)
This expert guide from SearchSecurity.com discusses the new Payment Card Industry (PCI) Mobile Payment Acceptance Security Guidelines and examines how to ensure compliance in a world where mobile payment has become ingrained into everyday life. 
(EGUIDE) READ ABSTRACT |

Security risks that can affect your industry by SearchSecurity.com

February 2012 - (Free Research)
As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment. 
(EGUIDE) READ ABSTRACT |

Mobile Device Management Technical Guide by SearchSecurity.com

March 2013 - (Free Research)
In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise. 
(EZINE) READ ABSTRACT |

Network Evolution E-Zine: Network security in a world of mobile workers by SearchNetworking.com

March 2012 - (Free Research)
In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance. 
(EZINE) READ ABSTRACT |

1 - 25 of 443 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts