Endpoint Security Research
-
Best Practices for Managing and Understanding Mobile Authentication
Sponsored by: TechTarget SecurityIn this expert guide, you’ll learn some common mistakes made by today’s organizations when it comes to identity and access management (IAM) on mobile devices. You’ll also find tips for managing mobile authentication methods and setting mobile policies.
-
Top 10 BYOD Pitfalls to Avoid
Sponsored by: TechTarget SecurityThis expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology.
-
Rethink Defense-In-Depth Security Model For BYOD
Sponsored by: TechTarget SecurityThis e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
-
Mobile Configuration Management Functions for Successful MDM
Sponsored by: TechTarget SecurityConfiguration management is one of the most essential (if not the most essential) function served by mobile device management. In this expert guide from SearchConsumerization.com, you'll get a detailed look at the considerations you need to take concerning configuration management.
-
A CIO’s 5 Point Plan for Managing Endpoint Security and Implementing MDM
Sponsored by: TechTarget SecurityIn this e-guide, our expert Niel Nickolaisen offers a five-point solution for managing endpoint security for the hyper-connected enterprise. Then expert Lisa Phifer shares what mobile device management software IT needs and why.
-
Mobile Device Data Protection: Key Findings and Players in the Market
Sponsored by: TechTarget SecurityThis E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.
-
Modern Infrastructure July 2013
Sponsored by: TechTarget Data CenterThe July issue of Modern Infrastructure covers the challenges of private cloud adoption, along with endpoint management and top-notch server and network design.
-
Top 10 Features of BlackBerry Enterprise Service 10
Sponsored by: BlackBerryIT leaders need a solution that can help them manage multiple platforms, mixed ownership and higher usage. Why do so many CIOs turn to BlackBerry Enterprise Service 10 for help overseeing their mobility management needs? Find out in this white paper.
-
Protection for Every Enterprise: How BlackBerry 10 Security Works
Sponsored by: BlackBerryIf you're choosing a platform for enterprise-grade mobile device management, security probably tops your list of requirements. Learn how BlackBerry Enterprise Service 10 can help you secure and manage not only BlackBerry devices, but iOS and Android devices as well, enabling the cross-platform mobility management you need.
-
Strategy for Securing Mobile Content - 5 Key Guidelines
Sponsored by: Accellion, Inc.Inside, you'll find 5 guidelines that every organization should follow for comprehensive mobile security.
-
How to add Mobile Devices to Enterprise PKI solutions
Sponsored by: OpenTrustExtending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
-
Shift Your Thinking on Endpoint Protection
Sponsored by: CenterBeamIn this e-guide, SearchSecurity.com experts explain the state of endpoint security and why it's time to change our endpoint protection approach. View now to learn more.
-
File Sync and Share vs. Endpoint Backup
Sponsored by: Code42This short white paper provides insight into clearing up the confusion between backup and sync/share.
-
Accellion raises the bar in secure cloud-based file sharing
Sponsored by: Accellion, Inc.The vendor featured in this whitepaper recently released new tools for collaboration functionality and is eager to prove itself as a strong competitor in the enterprise collaboration market. Read on to learn how they can help your organization adopt truly secure cloud-based file sharing.
-
FAQ Guide on Endpoint Management
Sponsored by: CenterBeamThis e-guide from SearchSecurity.com features an FAQ to help you understand the best methods of endpoint management and why cloud-based services should be considered a viable option.
-
Best Practices for Managing Endpoints in the Era of Consumerization
Sponsored by: TechTarget Mobile ComputingThis expert resource will show how you can tackle endpoint management more methodically by coming to terms with BYOD, securing data effectively, and addressing enterprise mobility management. Read on to learn more today.
-
A CIO's Five-Point Plan for Managing Endpoint Security
Sponsored by: Dell KACEManaging endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
-
Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
Sponsored by: ImpervaIn this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
-
Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
Sponsored by: CitrixExplore the details of an end-to-end mobility solution that simplifies mobile integration into the network and helps you overcome the top challenges enterprise mobility presents, from visibility and management to scalability and security.
-
Security University: Data Loss Prevention
Sponsored by: TechTarget SecurityThe difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.
-
How IFCG Protects Their Data With Managed Security
Sponsored by: No Panic ComputingIndependent Financial Concepts Group (IFGC) knew that they needed a solution to help them configure, secure and support the devices containing sensitive information at a low cost. Read on to learn who IFGC turned to in order to help them do just that.
-
Citrix Mobile Solutions Bundle - Product Overview
Sponsored by: Citrix Systems, Inc.Read on and learn more about an integrated approach to mobile device management that can provide comprehensive IT control and policy enforcement while empowering end-user productivity via beautifully delivered mobile applications.
-
Mobile Device Management Live Chat
Sponsored by: TechTarget SecurityIn this live Q&A, Philip Clarke, research analyst with Nemertes Research, will discuss the security benefits and tradeoffs of MDM and help you understand whether it's a fit for your mobile security needs.
-
Enabling a Safe and Secure "Bring Your Own Device" (BYOD) Environment
Sponsored by: DellEMC and Intel®Uncover details of a holistic, effective approach that will help you enable BYOD in the enterprise without compromising user needs for security or control.
-
Cloud Security, Options and Trends
Sponsored by: CenterBeamJoin Shahin Piroozof, Chief Technology Officer at Centerbeam, in this technical webcast as he discusses the nature of security in the cloud environment, as well as how to tailor your cloud infrastructure to meet your organization’s need.