Wireless Handheld Device Security Reports

The State of Cloud Based Security - Taking a Cloud-Based Approach to Security Can Improve Protection and Lower Costs
sponsored by OpenText Security Solutions
WHITE PAPER: Traditional endpoint solutions are becoming less effective as the threat environment increasingly grows more complex. However, cloud-based security may be the answer, offering an opportunity for improved security, while saving costs. View this paper to explore the current state of cloud-based security, advantages of cloud-based security, and more.
Posted: 30 Jan 2012 | Published: 30 Jan 2012

OpenText Security Solutions

Best Practices for Managing and Understanding Mobile Authentication
sponsored by TechTarget Security
EBOOK: In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
Posted: 12 Jul 2013 | Published: 12 Jul 2013

TechTarget Security

Security risks that can affect your industry
sponsored by TechTarget Security
EGUIDE: As the threat landscape continues to evolve, the approaches to thwart them must also. But with emerging trends like social networking and the influx of mobile devices, ensuring adequate security is becoming more complex. In this expert resource, explore the security risks organizations face in today’s changing environment.
Posted: 08 Feb 2012 | Published: 08 Feb 2012

TechTarget Security

The Best of RSA: Mobile Security
sponsored by TechTarget Security
EGUIDE: To help organizations grapple with the new challenges of IT consumerization and BYOD, the RSA conference held its own session track specifically on mobile device security. Get an inside look into the session and gain key insight into the major issues today including BYOD policies and threats, and uncover new countermeasures and strategies.
Posted: 03 May 2012 | Published: 03 May 2012

TechTarget Security

About to Buy Guide: Mobile Device Management Software
sponsored by TechTarget Security
EBOOK: Are you in the market for a mobile device management (MDM) software solution? Be sure to read this e-book from SearchConsumerization.com first for help making a more informed purchasing decision.
Posted: 21 Nov 2012 | Published: 30 Mar 2012

TechTarget Security

What’s the Best Focus for MDM Strategy Now?
sponsored by TechTarget Security
EBOOK: This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters.
Posted: 12 Mar 2014 | Published: 12 Mar 2014

TechTarget Security

Choosing an MDM System: Fundamental Features for Success
sponsored by Fiberlink
EGUIDE: This essential e-guide from our experts at SearchSecurity.com will help you understand the technologies and practices you need to implement in order to make your BYOD security program effective. Inside, you'll find a breakdown of the fundamental security features needed for BYOD management, a mobile device management checklist, and more.
Posted: 24 May 2013 | Published: 24 May 2013

Fiberlink

An effective mobile device security policy
sponsored by TechTarget Security
EGUIDE: Read this expert E-Guide to find your starting point on how to write an effective mobile device security policy and reign successful over the threats they present.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

TechTarget Security

Malicious Mobile Threats Report, 2010-2011
sponsored by Juniper Networks, Inc.
WHITE PAPER: Threats to mobile devices are real, and lacking proper oversight and awareness can lead to serious consequences. In this report explore new and emerging mobile threats and attack vectors, as well as gain practical threat mitigation techniques.
Posted: 15 Feb 2012 | Published: 15 Feb 2012

Juniper Networks, Inc.

CRM for the Professional on the Go
sponsored by BlackBerry
WHITE PAPER: Mobile CRM is something that needs to be considered now. As a business leader, you might have put it into your mental to do later box, but the reasons to make it a priority are compelling. Read this paper to discover why.
Posted: 01 Sep 2008 | Published: 25 Dec 2006

BlackBerry