mobile device InfrastructureWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: mobile device Infrastructure returned the following results.
RSS What is RSS?
Related Categories

 •   Mobile Device Management
 •   Wireless Technologies and Mobile Computing
 •   Wireless Security
 •   Endpoint Security
 •   Data Security
 •   Network Security
 •   Security Policies
 •   Security Monitoring
 •   Application Security
 •   Laptops/ Notebooks/ Tablet PCs

Related Searches
 •   Coding mobile device Infrastructure
 •   Costing mobile device Infrastructure
 •   Financial mobile device Infrastructure
 •   Java mobile
 •   Outsourcing mobile
 •   Products mobile
 •   Solution mobile device
 •   mobile Capacity
 •   mobile Texas
 •   mobile device Measurement
Advertisement

ALL RESULTS
1 - 25 of 398 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

SANS Analyst Report: The Risks with Mobility and BYOD by Hewlett-Packard Limited

March 30, 2012 - (Free Research)
Businesses are migrating to a more mobile environment. Individuals use mobile apps and devices are used for both personal and business reasons. With today's workforce relying on mobility and apps, they can create a riskier environment for valuable information. 
(WHITE PAPER) READ ABSTRACT |

Choosing and Managing Mobile Devices - Chapter 1: Addressing Challenges in Mobile Device Management by Dell and VMware

August 22, 2013 - (Free Research)
This expert ebook examines some critical data security and employee-related challenges you will inevitably face when attempting to manage mobile devices. Read on and learn how to overcome these challenges and streamline your mobile device management. 
(EBOOK) READ ABSTRACT |

Mobile Device Management Technical Guide by SearchSecurity.com

March 06, 2013 - (Free Research)
In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise. 
(EZINE) READ ABSTRACT |

Understanding the risks of mobile apps by Veracode, Inc.

May 11, 2012 - (Free Research)
Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks. 
(WHITE PAPER) READ ABSTRACT |

Productivity, Mobility and Efficiency: Keeping Your Devices Secure by Cisco Systems, Inc.

November 07, 2012 - (Free Research)
In this research report, uncover how organizations are – or should be – responding to the invasion of mobile devices in the workplace, the emerging trends in enterprise mobility today, best practices for ensuring effective mobile policies, and much more! 
(WHITE PAPER) READ ABSTRACT |

Getting a better grip on mobile devices by IBM

March 14, 2013 - (Free Research)
Read this whitepaper and learn how to unlock the business opportunities that BYOD has to offer through proper mobile device management. Get tips on managing mobile applications, implementing management technology, creating a BYOD plan, and more. 
(WHITE PAPER) READ ABSTRACT |

eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network by SearchMobileComputing

December 2008 - (Free Research)
Structured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware. 
(EBOOK) READ ABSTRACT |

Mobile device protection: tackling mobile device security risks by Juniper Networks, Inc.

June 2012 - (Free Research)
The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated. 
(EGUIDE) READ ABSTRACT |

Mobile Device Security: Emerging Threats, Essential Strategies by Juniper Networks, Inc.

February 2012 - (Free Research)
In this resource, explore the emerging threats organizations face with the rise of mobile computing. View now to discover key strategies for securing mobile devices, including the essential requirements for an effective solution. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Management for Dummies by Sybase, an SAP company

May 2009 - (Free Research)
Mobile Device Management For Dummies is your guide to managing and securing mobile computing equipment such as laptops and handheld devices. You get the lowdown on enterprise mobile device management and how Sybase's Afaria solution can help you. 
(BOOK) READ ABSTRACT |

Ponemon Global Study on Mobility Risks by Websense, Inc.

February 2012 - (Free Research)
With the proliferation of mobile devices only progressing, it’s important fully to understand this trend to know how to build a robust security strategy to mitigate risks. This resource uncovers key findings based on a survey of 4,640 IT pros, exploring the major security issues of mobility and what they are doing to effectively address them. 
(WHITE PAPER) READ ABSTRACT |

An effective mobile device security policy by McAfee, Inc.

November 2011 - (Free Research)
Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present. 
(EGUIDE) READ ABSTRACT |

Mobile Device Security: What Senior Managers Should Know by Sophos, Inc.

October 2012 - (Free Research)
In this article, find practical advice to help you effectively manage the iPads, Android phones, and other next-generation mobile devices in your organization in order to minimize risk and drive business success. 
(WHITE PAPER) READ ABSTRACT |

The CIO’s Guide to Building a Mobile Device Management Strategy – And How to Execute on It by BlackBerry

September 2012 - (Free Research)
As the mobility trend continues to take over the business world, CIOs are left with the difficult task of figuring out the best way to manage the drastic increase in mobile users. Discover how mobile device management (MDM) strategies can enable you to improve mobile security, increase productivity, reduce TCO, and more. 
(WHITE PAPER) READ ABSTRACT |

Future Proofing Mobile Device Management by BlackBerry

December 2011 - (Free Research)
This expert E-Guide discusses best practices for future proofing your mobile device management. 
(EGUIDE) READ ABSTRACT |

Mobile Device Security Overview by BlackBerry

September 2011 - (Free Research)
This expert E-Guide highlights the 3 components for solid mobile device security, top mobile operating systems and more. 
(EGUIDE) READ ABSTRACT |

Why choose Symantec for Mobile Device Management by Symantec Corporation

June 2012 - (Free Research)
In this white paper, learn some of the most important considerations for deploying a mobile device management solution. Additionally, discover key tips for building a successful framework for planning your mobile security strategy. 
(WHITE PAPER) READ ABSTRACT |

Expert Discussion: Mobile device security in health care by Hewlett-Packard Company

April 2012 - (Free Research)
This E-Guide discusses some of the most significant trends and themes concerning mobile device security in health IT. Discover what it will take to deploy a stable, cost-efficient mobile security system in your hospital. 
(EGUIDE) READ ABSTRACT |

Mobile Device Management Systems Help Mitigate BYOD Risks by Citrix Systems, Inc. (E-mail this company)

March 2013 - (Free Research)
This whitepaper will help you learn how mobile device management (MDM) can be used to mitigate the risks associated with mobility and BYOD. Learn more about multi-platform MDM, lifecycle management, enforcing compliance, and other topics. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: How to Secure Your Mobile Devices by Dell SecureWorks UK

August 2011 - (Free Research)
In this presentation transcript, Paul Pearston, a Senior Security Engineer at Dell SecureWorks, discusses the most serious security threats to mobile devices and recommends specific approaches for securing the mobile organization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Mobile Health Handbook: Device Security by SearchHealthIT.com

March 2013 - (Free Research)
Finding the balance between convenience and security is the key for successful mobile device management. Review expert techniques and strategies for achieving this objective in this handbook on mobile device security for the health care organization. 
(EBOOK) READ ABSTRACT |

About to Buy: Mobile Device Management Software by GroupLogic

March 2012 - (Free Research)
Discover how you can take back control of your enterprise from the influx of personally owned mobile devices with the help of mobile device management (MDM) software. 
(EBOOK) READ ABSTRACT |

Best Practices for Mobile Device Support by LogMeIn, Inc.

February 2012 - (Free Research)
Uncover the driving growth of mobile devices in the workplace and four best practice tips for how your business can support mobile devices. 
(WHITE PAPER) READ ABSTRACT |

Mobile Device Management Cloud Report by Zenprise

August 2012 - (Free Research)
This quarterly report on mobile device management (MDM) cloud practices explores the latest trends surrounding the device enrollment, application usage, and security of mobile devices in the enterprise. 
(WHITE PAPER) READ ABSTRACT |

The Ten "Must Haves" for Secure Mobile Device Management by Zenprise

August 2012 - (Free Research)
Uncover the risks mobile devices bring to your enterprise and how an end-to-end mobile security framework can help you monitor, control, and protect the devices accessing your network and corporate data and applications. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 398 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts