Wireless Data Security Reports

Mobile data protection best practices
sponsored by TechTarget Security
EGUIDE: Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

TechTarget Security

Build a Business Case: Embrace Change. Maintain Control. CYOD Lets You Do Both.
sponsored by Insight
WHITE PAPER: Read on to learn more about CYOD and why so many organizations are seeing this as a viable option to adopt mobility in the enterprise without the security hassles of BYOD. Explore the business case for CYOD, how CYOD works, and more.
Posted: 13 May 2013 | Published: 13 May 2013

Insight

Understanding Consumer Device Management and BYOD
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchConsumerization.com provides you with the BYOD resources necessary to ensure a successful implementation, creation, and adoption. View now to learn more!
Posted: 28 Nov 2012 | Published: 28 Nov 2012

TechTarget Security

Transcript: Covering the basics in MDM? Why it’s time to advance your strategy
sponsored by BlackBerry
PRESENTATION TRANSCRIPT: Uncover the latest in the world of enterprise mobility as you uncover today's real world problems, traits of the most secure organizations, the future of mobility, and much more!
Posted: 07 Nov 2012 | Published: 07 Nov 2012

BlackBerry

June Information Security Magazine
sponsored by TechTarget Security
EZINE: Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. Our June cover story provides insight into adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. We also look at big data analytics and security and provide an update on FedRAMP.
Posted: 05 Jun 2013 | Published: 05 Jun 2013

TechTarget Security

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

Mobile device protection: tackling mobile device security risks
sponsored by TechTarget Security
EGUIDE: The proliferation of mobile devices into the enterprise has put mobile device security risks as a top priority for many organizations today. In this e-guide from SearchSecurity.com, gain expert insight on how to tackle mobile device security risks and explore why your current approach might need to be reevaluated.
Posted: 04 Jun 2012 | Published: 04 Jun 2012

TechTarget Security

Security for BlackBerry Devices with Bluetooth Wireless Technology
sponsored by BlackBerry
WHITE PAPER: This document provides information about the Bluetooth® wireless technology and its uses with BlackBerry Device Software and the potential vulnerabilities in Bluetooth wireless technology.
Posted: 11 Aug 2006 | Published: 01 Aug 2006

BlackBerry

IT in Europe: Taking control of smartphones: Are MDMs up to the task?
sponsored by TechTarget Security
EZINE: In this Special European edition of Information Security magazine, gain key insight into the increasing risks of mobile devices and the strategies and tools needed to mitigate them. View now to also explore VDI security, cybersecurity threats, IT consumerization deluge, and much more.
Posted: 23 Feb 2012 | Published: 23 Feb 2012

TechTarget Security

Choose Your Own Device (CYOD) Workshop
sponsored by Insight
WHITE PAPER: Read on to learn about a CYOD workshop that can help you understand and develop a winning CYOD strategy with help from industry experts. Find out how taking advantage of this valuable learning experience will help you get a good grasp on policies and compliance, device lifecycles, device management, and more.
Posted: 10 May 2013 | Published: 31 Mar 2013

Insight