Network Computing Mobile Security SmartphonesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Network Computing Mobile Security Smartphones returned the following results.
RSS What is RSS?
Related Categories

 •   Wireless Technologies and Mobile Computing
 •   Mobile Device Management
 •   Wireless Security
 •   Data Security
 •   Endpoint Security
 •   Network Security
 •   Security Policies
 •   Application Security
 •   Laptops/ Notebooks/ Tablet PCs
 •   Security Monitoring

Related Searches
 •   Managers Network Computing Mobile
 •   Network Computing Markets
 •   Network Computing Mobile Reviews
 •   Network Computing Need
 •   Network Computing Networking
 •   Network Computing Portal
 •   Network Reservation
 •   Network Tutorials
 •   Related Network
 •   Solution Network Computing
Advertisement

ALL RESULTS
1 - 25 of 435 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Smart Policies for Personal-Liable Smartphones by BlackBerry

April 05, 2010 - (Free Research)
This white paper addresses how businesses and employees can compromise between personal and business smartphone use, as well as benefit by establishing personal-liable smartphone policies. 
(WHITE PAPER) READ ABSTRACT |

Employee-owned Smartphones: Seize the Opportunity by BlackBerry

July 27, 2010 - (Free Research)
With the increasing demand for employees to use personal smartphones for work-related duties, IT management must take a leadership role in setting up mobile strategies, new policies, and a fresh approach to allowing smartphones access to corporate resources. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

Communications Leader Videotron Hopes to save $1.6 Million by Automating Service Calls on Blackberry Smartphones by BlackBerry

February 25, 2009 - (Free Research)
Encumbered by paper-based work orders and instructions relayed verbally, Cable TV company Videotron needed a solution that helped manage service requests in a way that cut costs and service call mistakes. They chose a wireless solution from Blackberry that automates all administrative steps involved in handling a service call. 
(CASE STUDY) READ ABSTRACT |

Honey Stick Report Results by Symantec Corporation

April 09, 2012 - (Free Research)
The Symantec Smartphone Honey Stick Project is an experiment involving 50 “lost” smartphones, demonstrating what users should expect to happen to their smartphones if they are lost and then found by a stranger. View now to explore key findings and uncover recommendations for protecting mobile devices and sensitive information. 
(WHITE PAPER) READ ABSTRACT |

Expert Tips on Getting Mobile Securely with Virtual Desktops by SearchSecurity.com

September 30, 2011 - (Free Research)
In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices. 
(EGUIDE) READ ABSTRACT |

Tablets and Smartphones in the Enterprise: Risks and Management Concerns by SearchSecurity.com

August 21, 2012 - (Free Research)
This IT Handbook from SearchConsumerization.com offers a number of ways that you can incorporate BYOD into your company without compromising security – giving your employees what they want and keeping your environment safe and manageable at the same time. 
(EBOOK) READ ABSTRACT |

Securing Corporate Data in the Age of Mobile Computing by SearchSecurity.com

January 20, 2012 - (Free Research)
This Expert Briefing from SearchConsumerization.com discusses key tips for enterprises to allow employees to work from their personal devices while ensuring corporate data remains secure. 
(EBOOK)

IT Handbook : Smartphones & Tablets in the Enterprise by SearchSecurity.com

April 10, 2012 - (Free Research)
This IT Handbook from SearchConsumerization.com explores the growing trend of consumerization and how you can embrace it in your organization. 
(EGUIDE) READ ABSTRACT |

BYOD Security Policy, not MDM, at Heart of Smartphone Security by SearchSecurity.com

September 19, 2013 - (Free Research)
This expert guide discusses how effective policies can solve corporate mobile device security issues, and why these policies are better at protecting smartphones than an MDM solution. 
(EGUIDE) READ ABSTRACT |

10 best practice suggestions for common smartphone threats by Dell SecureWorks UK

August 31, 2011 - (Free Research)
Mobile devices have introduced a whole new set of risks into enterprise security, and IT teams need strategies to protect against them. Read this paper to uncover 10 of the most common threats associated with smartphones and mobile devices, along with best practices to help mitigate risks. 
(WHITE PAPER) READ ABSTRACT |

Secure Smartphone Apps: The Next Generation by BlackBerry

April 07, 2010 - (Free Research)
The latest smartphone applications foster more mobility and productivity than ever before--as long as a secure mobile network is in place. This white paper addresses mobile applications and the potential security threats to the corporate networking as well as provide security measures to take. 
(WHITE PAPER) READ ABSTRACT |

Six Lessons Learned as Hospitals Journey to Smartphone Utopia by BlackBerry

August 06, 2010 - (Free Research)
This white paper reviews six lessons hospitals have learned as they incorporate smartphones into their existing enterprise communications infrastucture. 
(WHITE PAPER) READ ABSTRACT |

Mobile Security Strategies by ComputerWeekly.com

November 09, 2012 - (Free Research)
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise. 
(ANALYST REPORT) READ ABSTRACT |

Yes You Can Connect Employees' Personal Smartphones by BlackBerry

September 12, 2011 - (Free Research)
Employees are flooding IT departments with requests to connect their personal smartphones to the company IT infrastructure. Disregarding the real productivity benefits from connected employees, until now many IT departments have been too concerned with security and control risks. 
(WHITE PAPER) READ ABSTRACT |

Desktop Administrator's Guide to BYOD - Pros and Cons of BYOD by SearchSecurity.com

November 30, 2012 - (Free Research)
BYOD and BYOPC can reduce costs, increase flexibility, and help keep your users happy. But to maximize the benefits and minimize the risk, it is essential to put the right policies in place. Read this E-Book to uncover the promises and pitfalls of these trends and how you can embrace them in your enterprise. 
(EBOOK) READ ABSTRACT |

Mobilizing Field Forces on Smartphones by BlackBerry

August 06, 2009 - (Free Research)
This ABI Research white paper examines the use of smartphones as tools for mobile field workers as a replacement for rugged devices. Through interviews with multiple companies with we found that the TCO of owning smartphones was 14% - 85% less than rugged devices. 
(WHITE PAPER) READ ABSTRACT |

Smart Devices, Smart Security by Voltage Security, Inc.

July 09, 2012 - (Free Research)
This short white paper explores the top 5 tips for protecting your organization against new looming security threats from smartphones and tablets. These 5 tips can make or break mobile data security efforts. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

It's All About Security: Things to Know Before You Open The Doors To Smartphones and Tablets in Your Enterprise by Sybase, an SAP company

June 01, 2011 - (Free Research)
This white paper discusses mobile device security threats and how IT can manage and secure devices. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to protect end users, their devices, and the network infrastructure. 
(WHITE PAPER) READ ABSTRACT |

PCI Council issues mobile application rules for software developers by SearchSecurity.com

April 25, 2013 - (Free Research)
The Payment Card Industry (PCI) Security Standards Council has demanded the development of mobile applications that include comprehensive security controls. This expert resource will help you understand what the new guidelines call for in terms of security controls, the history behind these standards, and further developments. 
(EGUIDE) READ ABSTRACT |

Expert Tips for Managing Mobile Devices in the Enterprise by SearchSecurity.com

March 13, 2012 - (Free Research)
Get expert tips for managing the mobile device explosion in the enterprise, and also learn about the brave new work of enterprise device management. 
(EGUIDE) READ ABSTRACT |

About to Buy: Mobile Device Management Software by SearchSecurity.com

August 10, 2012 - (Free Research)
Are you considering purchasing mobile device management (MDM) software? Read this "About to Buy" guide from SearchConsumerization.com for help making a smart MDM software purchase. 
(EBOOK) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix Systems, Inc. (E-mail this company)

June 01, 2014 - (Free Research)
Uncover the issues that arise when allowing Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions – and the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Security Lacking in Most Hospital Policy Discussions by Essextec

June 11, 2013 - (Free Research)
This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed. 
(EZINE) READ ABSTRACT |

Employee-owned Smartphones: Seize the Opportunity by BlackBerry

September 12, 2011 - (Free Research)
It’s no longer feasible for an IT department to ignore the smartphone push from the majority of the employee population. IT management must attempt to channel the chaos and determine ways to embrace the personal mobility wave while maintaining effective security and management measures, especially in relation to the corporate network. 
(WHITE PAPER) READ ABSTRACT |

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 27, 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

1 - 25 of 435 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts