ComputerWeekly.com Research Library

Powered by Bitpipe.com

Handheld Device Security Research

  • Best Practices for Managing and Understanding Mobile Authentication

    Sponsored by: TechTarget Security

    In this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.

  • Mobile Configuration Management Functions for Successful MDM

    Sponsored by: TechTarget Security

    Configuration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management.

  • A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM

    Sponsored by: TechTarget Security

    In this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.

  • Information Security Essential Guide: Strategies for Tackling BYOD

    Sponsored by: TechTarget Security

    Let this e-book from our independent experts be your guide to all things related to mobile security in the face of the BYOD trend. Inside, you'll get helpful insight that will help you understand the ins and outs of mobile device management technologies, how to tackle the problem of mobile application security, and much more.

  • Mobile Device Management: Fundamental steps for success

    Sponsored by: TechTarget Security

    This expert e-guide from SearchConsumerization.com will highlight a number of ways IT can prepare for the influx of mobile devices into the workplace and lay the foundation needed to successfully support mobility. Learn about setting up your network structure for mobility, fundamental features for success when choosing an MDM system, and more.

  • State of the Art on Managing Endpoints

    Sponsored by: Dell and VMware

    This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.

  • What’s the Best Focus for MDM Strategy Now?

    Sponsored by: TechTarget Security

    This guide provides expert advice on how to craft a mobile device security strategy that safeguards enterprise assets and prevents minor security issues from becoming major security disasters.

  • BYOD File Sharing – Go Private Cloud to Mitigate Data Risks

    Sponsored by: Accellion, Inc.

    Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.

  • Mobility Mayhem: Balancing BYOD with Enterprise Security

    Sponsored by: Code42

    Join this exclusive webinar now to hear security experts dive deep into how BYOD impacts enterprise security strategies and provide practical tips for securing your mobile workforce.

  • Why now is the Time to Get Started with BlackBerry Enterprise Service 10

    Sponsored by: BlackBerry

    To prepare for the new BlackBerry, many IT managers are turning to BlackBerry Enterprise Service 10 to provide unified device management for BlackBerry OS, BlackBerry 10, iOS and Android devices. Get tips on mobile management and transitioning to BlackBerry Services, and learn how you can try the platform for free.

  • Top 10 Features of BlackBerry Enterprise Service 10

    Sponsored by: BlackBerry

    IT leaders need a solution that can help them manage multiple platforms, mixed ownership and higher usage. Why do so many CIOs turn to BlackBerry Enterprise Service 10 for help overseeing their mobility management needs? Find out in this white paper.

  • Protection for Every Enterprise: How BlackBerry 10 Security Works

    Sponsored by: BlackBerry

    If you're choosing a platform for enterprise-grade mobile device management, security probably tops your list of requirements. Learn how BlackBerry Enterprise Service 10 can help you secure and manage not only BlackBerry devices, but iOS and Android devices as well, enabling the cross-platform mobility management you need.

  • Strategy for Securing Mobile Content - 5 Key Guidelines

    Sponsored by: Accellion, Inc.

    Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.

  • How to add Mobile Devices to Enterprise PKI solutions

    Sponsored by: OpenTrust

    Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.

  • FAQ Guide on Endpoint Management

    Sponsored by: CenterBeam

    This e-guide from SearchSecurity.com features an FAQ to help you understand the best methods of endpoint management and why cloud-based services should be considered a viable option.

  • Best Practices for Managing Endpoints in the Era of Consumerization

    Sponsored by: TechTarget Mobile Computing

    This expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.

  • Citrix Mobile Solutions Bundle - Product Overview

    Sponsored by: Citrix Systems, Inc.

    Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.

  • Mobile Device Management Live Chat

    Sponsored by: TechTarget Security

    In this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.

  • Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment

    Sponsored by: DellEMC and Intel®

    Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.

  • Mobile Device Security Lacking in Most Hospital Policy Discussions

    Sponsored by: Essextec

    This expert resource from SearchHealthIT.com will attempt to uncover why conversations about mobile security have been lacking, discuss the emerging trends surrounding BYOD policies, and advise readers how to ensure security protocols are properly followed.

  • User-Based Licensing for Endpoint Protection and BYOD

    Sponsored by: OpenText Security Solutions

    User-based licensing allows protection on multiple devices for each employee, meaning companies need only know the number of mobile workers, not the number of devices. Inside, you'll find 5 reasons you should consider user-based licensing for your organization.

  • June Information Security Magazine

    Sponsored by: TechTarget Security

    Mobile device management (MDM) continues to grow at a feverish pace, both in terms of adoption and mobile security features. Our June cover story provides insight into adoption trends, cross-industry issues, and MDM solutions best fit to varying requirements. We also look at big data analytics and security and provide an update on FedRAMP.

  • Choosing an MDM System: Fundamental Features for Success

    Sponsored by: Fiberlink

    This essential e-guide from our experts at SearchSecurity.com will help you understand the technologies and practices you need to implement in order to make your BYOD security program effective. Inside, you'll find a breakdown of the fundamental security features needed for BYOD management, a mobile device management checklist, and more.

  • The ClearPass Access Management System

    Sponsored by: Aruba Networks

    This whitepaper describes a way that you can take back control of your company network without having to string together a multitude of loosely integrated point-products that only lead to more complexity. Read on and learn how you can manage all things BYOD from one place.

  • SharePoint Security Should Not Be an Afterthought

    Sponsored by: Thawte Inc.

    This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.