Journals On Security Software For Mobile DevicesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Journals On Security Software For Mobile Devices returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security
 •   Endpoint Security
 •   Data Security
 •   Application Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Network Security
 •   Laptops/ Notebooks/ Tablet PCs

Related Searches
 •   Journals On Mississippi
 •   Journals On Security Designers
 •   Journals On Security Display
 •   Journals On Security Own
 •   Journals On Security Summary
 •   Journals On Standards
 •   Journals Purchasing
 •   Knowledge Journals On
 •   Rfq Journals On Security
 •   Whitepaper Journals
Advertisement

ALL RESULTS
1 - 25 of 434 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Dirty Little Secrets: Mobile Apps Invading Your Privacy by Veracode, Inc.

July 27, 2011 - (Free Research)
Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications. 
(WEBCAST) READ ABSTRACT |

McAfee Security Journal by McAfee, Inc.

December 2008 - (Free Research)
This edition of the McAfee Security Journal focuses on social engineering, the psychology of decision making, and elementary social psychology to analyze why people fall for social engineering without perceiving the deception. 
(WHITE PAPER) READ ABSTRACT |

Optim Data Growth Solution for Oracle's PeopleSoft Enterprise by IBM

IBM's Optim™Data Growth Solution for Oracle's PeopleSoft Enterprise provides proven archiving capabilities. Now you can align continuous control of your PeopleSoft data with business objectives to optimize performance, mitigate risks and control costs. 
(SOFTWARE PRODUCT)

Optim Data Growth Solution for Oracle E-Business Suite by IBM

Align continuous control of your E-Business Suite data with business objectives. Optim's proven archiving capabilities enable you to set desired service levels for each category of E-Business Suite data - for example, current data, reporting data and historical data. You maintain universal access to information. 
(SOFTWARE PRODUCT)

Archive Attender™ for Exchange - Affordable Email Archiving by Sherpa Software

Archive Attender is a solution designed to move or copy messages from mailboxes, PST files and public folders. Administrators search indexed archives and view reports for storage and compliance. No SQL database or proprietary hardware required. Offers flexible archiving architecture. Free Trial available. 
(SOFTWARE PRODUCT)

End-to-End Secure Client to Cloud Access Presentation Transcript by Intel

May 2011 - (Free Research)
In this presentation transcript, gain helpful insight on the information security issues surrounding cloud computing, including: data confidentiality, identity and access management and more. Learn how you can protect your critical data in the cloud. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400) by PowerTech

July 2008 - (Free Research)
This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform. 
(WHITE PAPER) READ ABSTRACT |

About to Buy: Mobile Device Management Software by SearchSecurity.com

August 2012 - (Free Research)
Are you considering purchasing mobile device management (MDM) software? Read this "About to Buy" guide from SearchConsumerization.com for help making a smart MDM software purchase. 
(EBOOK) READ ABSTRACT |

Mobile Security Strategies by ComputerWeekly.com

November 2012 - (Free Research)
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise. 
(ANALYST REPORT) READ ABSTRACT |

User-Based Licensing for Endpoint Protection and BYOD by Webroot

June 2013 - (Free Research)
User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization. 
(WHITE PAPER) READ ABSTRACT |

About to Buy: Mobile Device Management Software by GroupLogic

March 2012 - (Free Research)
Discover how you can take back control of your enterprise from the influx of personally owned mobile devices with the help of mobile device management (MDM) software. 
(EBOOK) READ ABSTRACT |

CW Buyers Guide: Mobile Device Management by ComputerWeekly.com

June 2013 - (Free Research)
Computer Weekly looks at mobile enterprise management tools in this 9 page Buyer's Guide. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Evaluating Mobile Device Management Products by TechTarget

March 2014 - (Free Research)
With new mobile devices emerging, MDM also needs to evolve to keep pace. But with an excess of products to choose from, deploying the best MDM software to monitor your mobile workforce can be cumbersome. Complete this brief survey to access our e-book, Evaluating Mobile Device Management Products, to find the best option for your organization. 
(RESOURCE)

Guide to Mobile Device Management Software by SearchSecurity.com

September 2012 - (Free Research)
This expert E-guide is set to be your guide to mobile device management (MDM) software, explaining what it is, why you need it, and what it should include. Read now to uncover how you can avoid potential pitfalls and ensure MDM success. 
(EGUIDE) READ ABSTRACT |

About to Buy Guide: Mobile Device Management Software by SearchSecurity.com

March 2012 - (Free Research)
Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision. 
(EBOOK) READ ABSTRACT |

Journal of Management Excellence: Creating Value, Part II by Oracle Corporation

May 2009 - (Free Research)
This collection of journal articles is focused on the concept of creating value and its importance as the key element for enterprise performance management (EPM). 
(JOURNAL ARTICLE) READ ABSTRACT |

Journal of Management Excellence - Enterprise Performance Management Innovations by Oracle Corporation

April 2010 - (Free Research)
This collection of journal articles focuses on the many facets of enterprise performance management that can help organizations thrive through the recovery, including; integrating the financial close and reporting process, managing the transition to IFRS, centralized enterprise dimension management. 
(WHITE PAPER) READ ABSTRACT |

Journal of Management Excellence: Building Trust by Oracle Corporation

July 2009 - (Free Research)
It is crucial for businesses to build trust with their customers, partners, investors, and with society at large. This journal article discusses building trust through modern performance management techniques, sustainability initiatives, managing reputation risk, end-to-end approaches to financial reporting and compliance, and more. 
(JOURNAL ARTICLE) READ ABSTRACT |

The mobile print enterprise by ComputerWeekly.com

February 2012 - (Free Research)
Quocirca looks at the case for mobile printing in the enterprise and suggests best practices for a mobile print strategy. 
(ANALYST BRIEF) READ ABSTRACT |

How to fit MDM Products into your Existing Infrastructure: Key tips by BlackBerry

November 2013 - (Free Research)
This expert guide from SearchConsumerization.com highlights steps that you can take to fit MDM products into your existing infrastructure smoothly and effortlessly. Read on and also learn how effective MDM can help you prepare for potential security issues. 
(EGUIDE) READ ABSTRACT |

PCI Council issues mobile application rules for software developers by SearchSecurity.com

April 2013 - (Free Research)
The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments. 
(EGUIDE) READ ABSTRACT |

The Importance of Securing Mobile Device Platforms by Dell Software

September 2013 - (Free Research)
Access this informative resource to discover which mobile security solutions are recommended for Apple, Android and Microsoft Windows devices. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 6 November 2012: The business benefits of 4G by ComputerWeekly.com

November 2012 - (Free Research)
In this week's Computer Weekly, as the UK's first 4G mobile network goes live, we examine the benefits for business. IT security suppliers say that cross-industry collaboration is needed – but can they work together? And we take a look at the latest wireless networking technology, known as WiGig. Read the issue now. 
(EZINE) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Windows Essential Business Server 2008: Deploying Windows Mobile 6 with Windows Essential Business Server 2008 by Microsoft

December 2008 - (Free Research)
This document provides step-by-step instructions for deploying devices powered with Windows Mobile 6 in an IT infrastructure that is based on the Windows Essential Business Server 2008 (Windows EBS 2008) server solution. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 434 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts